Skip to main content

Full text of "dg :: software :: rdos :: 093-000109-01 RDOS Command Line Interpreter"

See other formats


RDOS/DOS 

Command Line 
Interpreter 

User's Manual 

093-00U1 09-01 



For the latest enhancements, cautions, documentation 

changes, and other information on this product, please see 
the Release Notice (08 5 -series) supplied with the software. 



Ordering No. 093-000109 

©Data General Corporation, 1975, 1978 

All Rights Reserved 

Printed in the United States of America 

Revision 01, May 1978 

Licensed Material - Property of Data General Corporation 



IMaGeneral 

SOFTWARE DOCUMENTATION 



Licensed Material - Property of Data General Corporation 



NOTICE 

Data General Corporation (DGC) has prepared this manual for use by DOC personnel, licensees, 
and customers. The information contained herein is the property of DGC and shall not be 
reproduced in whole or in part without DGC prior written approval. 

DGC reserves the right to make changes without notice in the specifications and materials 
contained herein and shall not be responsible for any damages (including consequential) caused by 
reliance on the materials presented, including but not limited to typographical, arithmetic, or listing 
errors. 



RDOS/DOS 

Command Line Interpreter 

User's Manual 

093-000109 



Revision History: 

Original Release - February 1975 
First Revision - May 1978 



This document has been extensively revised from revision 00; therefore, 

change indicators have not been used. 



The following arc trademarks of Data -General Corporation, Wesiboro. Massachusetts: 
U.S. Registered Trademarks Trademarks 



CONTOUR I 
DATAPREP 
ECLIPSE 



INFOS 
NOVA 
NOVADISC 



NO\*ALITE 
SUPERNOVA 



DASHER 
microNO\'A 



Licensed Material - Property of Data General Corporation 



I^taGeneral 

SOFTWARE DOCUMENTATfON 



Preface 



This manual describes the Command Line Interpreter, 
which is your primary interface with Data General's 
Real-Time Disk Operating Svsiem (RDOS) or 
Diskette Operating System (DOS). RDOS and DOS 
use the same CLI. except for a few features and 
commands; these are noted as "RDOS" or "DOS" in 
the text. 

To use this manual properly; you'll need some 
experience with the CLI. If the CLI is new to you read 
Learning to Use Your RDOSiDOS Svstem. Learning to Use 
offers practical exercises with the CLI and other system 
utilities, and provides a background for both RDOS 
and DOS programming. 

We have organized this manual as follows: 



• Chapter I introduces the command mecha 
features of the CLI. 



nism and 



• Chapter 2 explains operating the CLI; it describes 
command line format, syntax, filename templates 
console breaks, and error handling. An 
understanding of this chapter will allow you to code 
command lines and manage your files. 

• Chapter 3 contains more advanced CLI features; it 
describes writing compact command lines, indirect 
commands, macros, and foreground/background 
programming. 

• Chapter 4 presents the CLI commands by category 
and alphabetically. The categorical command 
summary is printed on yellow stock. 

• Appendix A, which begins with a yellow page, 
contains an error summarv. Other appendixes 
include an ASCII character set, a description of 
dump files, and an explanation of CLI command 
interpretation. 



Certain CLI commands invoke Sysiem Unlaws which 
can help you write and develop your own programs. 
Each utility has its own protocol and error messaees. 
which are described briefly under its command entrv in 
Chapter 3, and more extensively in one of the manuals 
listed below. 

If you want a detailed explanation of RDOS or DOS. 
read the RDOS Reference Manual (ordering number 
093-000075), or DOS Reference Manual (093-000201) 
Different aspects of RDOS and DOS are covered in 
four other books: 

Introduction to RDOS (ordering number 093-000083). 

RDOS/DOS User's Handbook (093-000105). This is a 
pocket-sized summary of CLI commands and system 
utility features. 

How to Load and Generate Your RDOS Sysiem 
(093-000188). Data General supplies all the files" you 
need for SYSGEN. DOS SYSGEN is covered in the 
DOS Reference Manual. 

Learning to Use Your RDOS/DOS System (093-000223). 
This describes building programs in several different 
languages. 

For more on a system utility, or other useful topics, 
consult the appropriate manual from the following list: ' 

Extended ALGOL User s Manual (093-000052) 

Extended Assembler User's Manual (093-000040) 

Extended BASIC User s Manual (093-000065) 

Extended BASIC System Manager's Guide (093-000119) 

Batch User s Manual (093-000087) 

Sq/mare Catalog (093-000 1 06) 

Symbolic Debugger User s Manual (093-000044) 

fOR IRAN I V User s Manual (093-000053) 

FORTRAN IV Runtime Library User's Manual 

(093-000068) 



093-000109-01 



ill 



Preface 



I^taGeneral 

SOFTWARE DOCUMENTATION 

FOR TRAN 5 User s Manual (093-000085) 

FOR TRAN 5 Supplement (093-000 1 85) 

FORTRAN ■■ '5 Runtime Library User's Manual 

(093-000096) 

FORTRAN Commercial Subroutine Package 

(093-000107) 

Library File Editor User 's Manual (093-000074) 

Macroassembler User 's Manual (093-00008 1 ) 

Octal Editor User s Manual (093-000084) 

Publications Catalog (01 2-000330) 

Extended Relocatable Loaders (RLDR) User's Manual 

(093-000080) 

RDOS Sort/Merge User s Manual (093-000 1 08) 

Real Time Input/Output System User's Manual 

(093-000095) (This explains the DGC analog-digital 

interface.) 

Software Summary and Bibliographv (093-000 110) 

Superedit User s Manual (093-000 111) 

Symbolic Editor (093-00 1 60) 

Text Editor User s Manual (093-00001 8) 



Reader, Please Note: 

We use these conventions for command formats in this 
manual: 

COMMAND required [optional] ... 

Where Means 

COMMAND You must enter the command as 
shown, 

required You must enter some argument (such 

as a filename). Sometimes, we use: 



Licensed Material - Property of Data General Corporation 

Additionally, we use certain symbols in special ways: 
Symbol Means 

} Press the RETURN key on your 

terminal's keyboard. 

D Be sure to put a space here. (We use this 

only when we must; normally, you can 
see where to put spaces.) 

All numbers are decimal unless we indicate otherwise; 
e.g., 358. 

Finally, we usually show all examples of entries and 
system responses in THIS TYPEFACE. But, where we 
must clearly differentiate your entries from system 

responses in a dialog, we will use 

THIS TYPEFACE TO SHOW YOUR ENTRY ) 
THIS TYPEFACE FOR THE SYSTEM RESPONSE 



Within this manual, the word "disk" means either disk 
or diskette. 

We welcome your suggestions for the improvement of 
this and other Data General publications. To 
communicate with us, either use the postpaid remarks 
form at the end of this manual, or write directly to: 

Software Documentation 
Data General Corporation 
Route 9 
Westboro, MA 01581 



i required, I 
requiredaj 

which means you must enter one of 
the arguments. Don*t enter the 
braces; they only set off the choice. 

[optional] You have the option of entering some 

argument. Don't enter the brackets; 
they only set off what's optional. 

You may repeal the preceding entry or 
entries. The explanation will tell you 
exactly what you may repeal. 



End of Preface 



093-000109-01 



1 .fefriC lf^ni-^?7ll 
Licensed Material - Property ot Data General Corporation ' soFTWARE^^ENTAmN 



Contents 



Chapter 1 - Introduction 

CLI Commands i I 

Control Characters j.i 

System Utilities j_2 

Chapter 2 - Operating the CLI 

Command Line Format 2-1 

Command 9_l 

Global Switches 2-1 

Comma (,) or Spaces 2-1 

Arguments and Local Switches " ' 2-1 

Local Letter Switches ' " * ' 2-^ 

Local Numeric Switches " " " ' 2-2 

Carriage Return ( } ) 2-2 

CLI Response 2-2 

Combining Commands 2-'' 

Long Command Lines 7.2 

CLI Punctuation Summary 2-2 

File Media 2-4 

Nondisk Devices 2-5 

Listing File 2-6 

Disk Files " 2-6 

Disk Filenames 2-6 

Filename Extensions .... 26 

RDOS Utilities '.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'''' 2-1 

Disk Directories 2-7 

RDOS Partitions and Subdirectories '.'.'. 2-7 

DOS Directories ...,,..,.,..... " " ' ' 2-8 

Directory Names * * ' " 2-9 

Directory and File Access ' ' 2-9 

Filename Templates _ ■-........ ^^^^ 

Link Entries " ' " 2-11 

System Console Breaks .'.'.' 2-12 

Error Handling ■ ' " 2-12 

Using .ERTN ............................. 2-13 

Traps and System Errors 2-14 



093-000109-01 V Contents 



EtetaGoieml 

SOFTWARE DOCUMENTATION 



Licensed Material - Property of Data General Corporation 

Chapter 3 - Advanced Features 

Writing Compact Command Lines 3_2 

General Rules 3_2 

Parentheses -^ j 

Angle Brackets 3_2 

Expansion Example ...... 

Variables ' -. . 

Indirect and Macro Commands ^ ." .' ' 3.4 

CLI - System Interface sr 

Dual Programming (RDOS Only) \\\\\\\\ ^.(^ 

Executing Background and Foreground Programs ."".'.' ^ ' 3-7 

Terminating the Foreground Program 3-8 

Foreground-Background Example ..!.'..'.' 3-8 

Chapter 4 - CLI Commands 

filename . . 

ALGOL :\ 

APPEND :'^ 

ASM ::::::::::::::::::::::::: ts 

BASIC ' ; Q 

BATCH :::::::::::::::::::::::: tio 

BOOT ::"'"lio 

Stand-alone Programs ^ Iq 

Restart Feature ... .', , 

BPUNCH ^:\\ 

BUILD ^" ; 

CCONT ^'\{ 

CDIR Y\ 

CHAIN '.'.'.'.':.'.'.:.:.:.'.:.:.:.:. tl 

CH.ATR l\Z 

CHEAT ^:\\ 

CLEAR ,\% 

CLG :::::::::::::::::::::::::::: t 

COPY ^ « 

CPART • \^ 

GRAND ...... I in 

CREATE :f, 

DEB :::::::::::::::::: lA 

DELETE. ... .-it 

DiR :::::::::::::::::::::::::::::: : 

DISK ■ ■ • ■ • \y^ 

DUMP..... __ ■ ""'\?^ 

EDIT ■^_;; 

EKDLOG ... ."^r 

ENPAT. . . 4- b 

EXFG .::::::::::::•■■•••• Li 

Mapped S.vstems . 4.10 

Unmapped Systems ^ 

Unmapped ' ' /;^ 

Mapped . " 1\n 

FDUMP . . ■ ■ ■ • ■ -ZZ. 

FOND ■•■-•■•■•■■•■•■■••■■■ 4-30 

FILCOM , ■ 4-jl 

4-j2 



093-000109-01 



Licensed Material - Property of Data General Cornoratinn t*lAAX-ft\_J.lv*iai 

P^.iy ui i^ai.* vjciierdi v_orporaiion software documentation 

FLOAD 4 „ 

TORT '.'.'.'.:::::::'.:::::::'. 4-£ 

FORTRAN . • ■ 'i 

FPRiNT .....:::::::::: 4.h 

GDiR i: 

GMEM : • • j-il 

GSYS ■ ■ ■ ■ ■ ■ ■ i'it 

GTOD. . . 'Tii 

INIT . I't 

LDIR '.'.'.'.['". ■ ■ ■ 4:^9 

LFE :::::::::::: 4-39 

LINK '] 

LIST ::::::::::::: 4^4^ 

LOAD 4.44 

LOG ::::::::::: 4-45 

'^lAc ■ • ■ ,:,i 

MCABOOT ■ 4 ,7 

MDiR :::::::::::::: 4^49 

MEDIT 4 49 

MESSAGE 4 ,-n 

MKABS 4 :-, 

MKSAVE 4 -^ 

MOVE 4 52 

NSPEED ; ; 4.53 

oEDiT : : : : : : : : : 4-54 

OVLDR 4. ,4 

PATCH 4.55 

POP ::::::::""4-56 

PRINT 4. ° 

PUNCH 4.57 

RDOSSORT 4 CO 

RELEASE 4 ^Q 

RENAME ,/n 

REPLACE Alfs 

REV :::::::::::::::::::::::::::::::: i 

RLDR 4.61 

SAVE _ 4.64 

SDAY 4.64 

SEDIT 4.65 

SMEM 4.65 

SPDIS 4 ^^ 

SPEBL til 

SPEED :::::::::::::::::::::::::::::: t 

SPKILL 4.67 

STOD 4 % 

SYSGEN .......... ■ ' ' ' ' ' dll 

TPRiNT ..:.::::::::::::::::::::::::::::::::: rt 

TUOFF 4.70 

TUON 471 

TYPE .::::::::::::::::::::::" 4-71 

UNLINK .......... 4-77 

VFU;. ■■■■■■■■■.'.'.'.'.'.'.'.'.'.'.:::::::::::::::::::::::: 4^n 

Create a .VF File CVFU/C) 4-72 

Display a File ' ' 4.73 

Edii a File (VFU/E) ..........,.'.'.'.'.''.'.' 4-73 

Load a File into the Printer's Memorv " ' 4.74 

Access Control (VFU/A and VFU/D) " * ' 4.74 

^EER ...:::::::::::::::::::::::: 4-75 

093-000109-01 vii Contents 



I^taGenoBl 

SOFTWARE DOCUMENTAT.ON Liceiised Material . Property of Data General Corporation 

Appendix A - Error Messages 
Appendix B - Standard ASCII Character Set 
Appendix C - Dump File Format 
Appendix D - Extended Uses of the CLI 

Swapping and Chaining to the CLI q.j 

Returning with Error Status to the CLI . . D-1 

CLI Reserved Files q_3 

Using the CLFs Command File (COM.CM) ." . .'*'.'.''' ' . . . . [ [ ' .' ..'"*' ' D-3 
Utility Program COM.CM Structures '.'.'.'.'.'/' D-5 



^"» 093-000109-01 



Licensed Material - Property of Data General Corporation 



EktaGoieml 

SOFTWARE DOCUMENTATION 



Chapter 1 
Introduction 



The Command Line Interpreter is your primary 
interface with RDOS/DOS and their system utilities. 
From your viewpoint at the console, the CLI is a 
number of discrete commands which do helpful things 
with information - i.e., files. These commands provide 
the basis for maintaining a simple, productive, and 
happy relationship with RDOS or DOS and your 
computer. Figure I-l illustrates your relationship with 
the CLI. 

Among other things, CLI commands allow you to: 

• Develop your files into executable programs with 
the system utilities; 

• Execute a program; 

• Handle a file on disk, magnetic tape, or paper tape, 
or punched cards, and transfer any file between 
these media; 

• Create random, contiguous, or sequential files 
(RDOS only) on disk; 

• Combine many files into one file; 

• Build a file containing filenames, selecting the 
filenames by name, date, or other criteria. 

• Delete a file, or series of files, by name or date; 

• Restrict access or permit conditional access to a file; 

• Access a file from anywhere on disk via link entries; 

• Organize files into logical subdivisions on disk; 

• Write sequences of CLI commands into an indirect 
or macro file; 

• Write descriptive messages to the console during the 
execution of indirect or macro files; 

• Monitor console activity on your system via a log 
file; 



• Back up your disk files by dumping them onto mag 
tape, cassette, paper tape, or other disks. 

The CLI also protects data by aborting any command 
(except DELETE) whose execution would threaten an 
existing file, and returning an explanatory error 
message. Whenever it cannot execute any command, it 
displays an explanatory error message. 



CLI Commands 

A valid CLI command normally consists of the 
command name and one or more arguments. In many 
cases you can append switches to commands and 
arguments to modify command execution. The name 
of each command describes its function, for example: 

GRAND FILE1 FILE2 FILE3) 

CRAND is the command name; it is a contraction of 
"Create a RANDom file". This example creates three 
random files, with the names FILEl, FILE2, and 
FILE3. 

Control Characters 

If you make a mistake while typing, and you have not 
yet pressed the RETURN key, you can delete one 
character at a time by pressing the RUBOUT (or DEL) 

key. RUBOUT (or DEL) echoes as — (or J on 
teletypewriters. To delete the entire line, press the 
SHIFT and L keys simultaneously, or press the 
backslash key (\) on a DASHER or 6052/6053; the 
system will then echo a backslash (\). Then, re-enter 
the command. 

To abort an executing CLI command, press the CTRL 
and A keys simultaneously. CTRL-A halts command 

execution and returns the CLI prompt. CTRL-A is a 
system interrupt, and it will return you to the CLI from 
all utility programs except editors. We describe other 
interrupts at the end of Chapters 2 and 3. 



093-000109-01 



1-1 



Control Characters 



EfetaGaaeral 

SOFTV^'ARE DOCUMENTATION 



Licensed Material - Property of Data General Corporation 



You can interrupt output to your console at any time by 
typing CTRL-S. The output won't be lost; you can 
continue it from the point of CTRL-S by typing 
CTRL-Q. 

System Utilities 

Data General system utilities are useful program 
development tools which vou can access easily from 
CLI. 



The utility programs supplied with your system are 
listed in Table 1-L Additionally, you received the 



appropriate version of the system-generation program 
(SYSGEN). If you have DOS, you also received the 
diskette copy program (COPY); if you have RDOS, 
you received the fast-dump and fast-load programs 
(FDUMP and FLOAD) and the data channel line 
printer format control program (VFU). 

Other RDOS utilities available include BATCH (which 
can execute jobs serially without intervention), and the 
sort/merge program (RDOSSORT). 

Language compilers vou may have on vour svstem are: 
FORTRAN IV, FORTRAN 5, BASIC, ALGOL, 
COBOL, or DG/L. 



DISK' 




COMPUTER' 



Figure 1-1. The CL I Inierface ■ 



1-2 



093-000109-01 



Licensed Material - Property of Data General Corporation 

Table 1-1. System Utilities 



DataGeneral 

SOFTWARE DOCUMENTATION 



Utility 



Text Editors: 

Text Editor 

Multiuser Text Editor 
(RDOSonly) 

Superedit 



Assemblers: 

Extended 
Macro 



Library File Editor 



Loaders: 

Relocatable binary loader 

Overlay replacement loader 



Symbolic Debuggers: 

Debug allowing interrupts 
Debug with interrupts disabled 

Disk File Location Editor 
Symbolic Editor 
PATCH Utilities 



Invoked by This 
Command 



EDIT 
MEDIT 



NSPEED 
(for NOVAs) 

SPEED 

(for eclipses) 



Purpose 



ASM 
MAC 



LFE 



RLDR 



OVLDR (RDOS) 



DEB 

OEDIT 

SEDIT 

ENPAT 
PATCH 



To write and edit a program or 

text file. 



To assemble a source program 
(which might have been written 
with a Text Editor) into a 
binary file. 



To manipulate library files. 



To process (load) binaries and 
create an executable program. 

To replace overlays in an 
overlay file. 



To examine an executing 
program and correct errors. 

To examine and modify the 
contents of disk file locations. 

To examine, analyze and 
modify disk files. 

To create patch files. 

To apply patches in patch files. 



End of Chapter 



093-000109-01 



1-3 



System Utilities 



Licensed Material - Property of Data General Corporation 



I^taGeieral 

SOFTWARE DOCUMENTATION 



Chapter 2 
Operating the CLI 



This chapter describes CLI command formal, 
punctuation, file media, disk files and directories, 
filename templates, console breaks, and error 
handling. As you read each section, you should use the 
console to try your own versions of the examples. 

If you have not used the CLI before, sit down at the 
console with the manual Learning to Use Your 
RDOS/DOS Sysieni. and run through the console 
session in Chapter 2 (RDOS) or Chapter 3 (DOS). 

Command Line Format 

This is the normal formal of a CLI command: 

R 

COMMAND/global-switches args/Iocal-switches) 

CLI response 

R 

The "R" is the CLI prompt character. The CLI always 
follows the prompt with a carriage return-line feed, 
which allows you to start typing commands on the next 
line. You can append the time of day to this prompt or 
remove the time, by typing the command ".)" (period, 
then RETURN). 

Command 

COMyAND is the name of the command or system 
utility. 

Global Switches 

You can often modify a command by appending one or 
more global switches to a command name. A global 
switch applies to the command itself, not to any 
argument in the command line; it immediately follows 
the command name, and consists of a slash (/) 
followed by a letter. Generally, the meaning of a global 



switch depends on the command that it modifies (the 
CLI ignores switches that are irrelevant to the 
command). Each individual command entry in Chapter 
4 lists global switches. For example: 

DELETE/VFILEA) 

DELETE is the command-name, and /V is the switch 
that modifies the delete function: /V instructs the CLI 
to verify on the console that FILEA has been deleted. 

LIST/E/S) 

This command lists filenames; the global /E switch 
instructs CLI to list evm' statistic about files, and global 
/S sorts the listing alphabetically. 

Comma(,) or Spaces 

One or more spaces, or a single comma, separates the 
command and its arguments. Two or more consecutive 
spaces or commas are treated as a single delimiter. 

Thus, the following two commands are equivalent: 

DELETE FILEA.FILEB.FILEC 

and 

DELETE FILEA FILEB.FILEC 

Arguments and Local Switches 

Some commands are used alone; others are followed by 
one or more arguments. A switch which follows an 
argument is a local switch; it modifies that argument 
only. A local switch consists of a slash (7) followed by 
either a number or letter. Depending on the command, 
you can insert both local and global switches in a 
command line. The CLI ignores switches which are 
irrelevant to the argument. 



093-000109-01 



2-1 



Command Line Format 



EfetaGoieml 

SOFTWARE DOCUMENTATION 



argument. For 



Local Letter Switches 

A local letter switch modifies the action of the 
command on one argument. The meaning of each 
switch varies with the argument it modifies and the 
command line that contains the 

example: 

LOADMT0:0OBSFILE/N 8-7-77/A) 

The LOAD MTO:0 command alone would load all 

nonpermanent files in tape file onto disk. The local 
/N switch following OBSFILE instructs the CLI not to 
load OBSFILE; the local /A switch instructs the CLI to 
load only those files created on or after August 7, 1977. 

Local Numeric Switches 

A local numeric switch specifies the number of times 
the preceding argument is to be repeated in the 
command line. This number must be in the range 
through 9. For example, both 

PRINT MYFILE/3 YOURFILE) 

and 

PRINT MYFILE MYFILE MYFILE YOURFILE) 

will print MYFILE three times, and YOURFILE once, 

on the line printer. 

When used alone, the /O or /! switch has no effect; the 
CLI will place the argument once in the command line. 
When more than one numeric switch follows an 
argument, they are executed sequentially, hence the 
effect is additive. If you wanted to print 'mYFILE 19 
times, for example, you'd type: 

PRINT MYFILE/9/9/1) 

Carriage Return {}) 

A carriage return denotes the end of a command string. 

The command is executed after you press ihl; 
RETURN key on your console. 



Licensed Material - Property of Data General Corporation 
CLI Response 

Depending on your command, the console mav display 
hstmg, error, or other information. If the CLI was 
unable to execute the command, it will trv to tell you 
why in an error message. After it has executed the 
command, or returned an error message, it will display 
the R prompt. 

Combining Commands 

You can include two or more commands on the same 
command hne by placing semicolons (;) between the 
commands. For example: 

DELETE FILEA;CRAND FILEX FILEY) 

CLI executes the two comm^ands sequentially, after the 
carriage return is pressed. 

Long Command Lines 

An up arrow (SHIFT-N keys or SHIFT-6 keys on a 
DASHER) typed immediately before a carriage return 
allows you to span one or more commands over several 
input lines. Note that the CLI will not supply a delimiter 
between lines, so you must insert one manuallv - either 
before the uparrow or at the beginning of the new line 
For example: 

DELETE TESTA TEST01 1) 
TEST02) 



This executes as DELETE TESTA TEST01 TEST02 



CLI Punctuation Summary 

The characters in Table 2-1 ser%'e as delimiters or 
mstructions to CLI. Other special characters, which 
allow you to manipulate disk files and command lines 

are described in Chapter 3. 



2-2 



093-000109-01 



Licensed Material - Property of Data General Corporation 

Table 2-1. CLl Punctuation 



Symbol 



}orl 



(space) 



(„) 
< > 



• MC 



% 



u 



I^taGeneral 

SOFTWARE DOCUMENTATION 



Function 



The carriage return key (}) terminates an mpui command line and 
activates the CLI. The CTRL and L keys d) have the same effect. 

The SHIFT and L keys or backslash key {\) delete an entire fine. 

The RUBOUT key or DEL (echoed as -or _on teletvpewriters) erases 
the last character entered. On CRT displays the last character w.II 
disappear each time you press RUBOUT. 



Example 



The romma or space is used to separate arguments. E.xtra spaces have no 



The slash key before a character specifies a switch. 



The semicolon (;) delimits a command to CLI; vou can then tvpe 
another command on the line. No commands are executed umil you 
enter a carnage return. 

Ipt?"J?^ '""^ ^ °' ^"^^-^ ^'^y^ ^" ^°'I°^«d immediately by 
Kt TURN can extend command lines over multiple lines. ' 



This command adds or removes the time of day to the prompt 



Insert the colon between filenames to access a specific tape file or a 
filename m a different directory. The colon is described under Disk 
uirectories, below. 



If you enter an asterisk or dash with a filename, CLI will search for a 
ChTp^e°r 2 "^^"^"^es. These are template characters described in 



Parentheses and angle brackets are used when entering compact 
command Imes to CLI. These are described in Chapter 3, Writing 
Compact Command Lines. 



Commercial at signs indicate the contents of a file, rather than the 
filename itself The .MC extension designates a macro file For 
explanations of both @ and .MC, see Chapter 3, Indirect and Macro 



tie W?sTr F^' "^"'"""h liir' '"'' f ™8. They are most uset^ul with 
ttie Mh55AGE command (Chapter 4). 



Percent signs enclose a CLI-defined variable. See Chapter 3, Variables. 



(t'e rTdrI wT'',i," '^' ^^^^ '°™"^^"^ ""^ d^""^ ^ "S^'- overlay 
wee KLDR). Wuhm these commands, brackets are used literally thev 
don I mean optional entries. 



CREATE A B ) 
CREATE A BI 

CCREAGE \ 

CO— READ— TE 



DELETE A. 8) 
DELETE AS) 
DELETE A B) 



LIST/A j 



CREATE A;LIST} 



RENAME A ALPHA.I) 

BBETA f) 
EEPSILON} 



14:34:54 
R 



DUMPMT0:2} 

PRINT SUBDIR:FILEA} 



LIST'A) 
DELETE A-} 



(PRINT.DELETEILGG.CM) 
CRAIsiD <A,B.C,D>.SR} 



ASM ®F00@) 
DAYSEND} 



MESSAGE "HELLO" 



RELEASE %MDIR%) 



RLDR PROGA [A.BJ 



093-000109-01 



2-3 



CLI Punctuation Summary 



DataGeneral 

SOFTWARE DOCUMENTATION 



File Media 

To access a file, use its filename. On disk, each 
filename is an alphanumeric name which the file 
creator assigns; on mag tape or cassette, the filename is 
the devicename and a file number. A tape "filename" 
can hold one or more disk files. The tape devicename is 
an abbreviation (MT or CT) followed by the unit 
number (e.g., MTO). The system assigns file numbers 
sequentially, as you write files to the tape. On a new 
tape, you write the first file to number 0, the second to 
number I, and so on; if the tape is long enough (or 
your files are small enough) you can write up to 
number 99. To access a tape file, type the devicename, 
a colon, and the file number; e.g., 

LOAD MT0:3} 



Licensed Material - Property of Data Gerjeral Corporation 

loads the contents of file 3 of the tape mounted on 
Magnetic Tape unit 0, onto disk; and 

DUMPMT0:5) 

dum^psMhe contents of the current disk directory onto 
file 5 of the mag tape mounted on magnetic tape unit 0. 

Nondisk and nontape filenames are simply 
devicenames - special device mnemonics which begin 
with the character S. Common devices are console 
input (filename STTI), console output (STTO), line 
printer (SLPT). paper tape reader and punch (SPTR 
and SPTP), and card reader (SCDR). 

Table 2-2 gives the filenames of all RDOS devices. 



Table 2-2. RDOS Devicenames 



Devicename 



SCDR 



CTn 



DKO 



DSn 



DPn 



DPn 
DPnF 



DZn 



$0PI/SDPO 



SLPT 



Device 



Punched card reader; mark sense card 
reader. 

First cassette controller drive (n is in 
the range 0-7). The first file on a 
cassette tape is 0, the second 1 , and so 
on. To access any file, use a colon and 
the number; e.g., CT0:8. 

First model 6001-6008 fi.xed-head disk, 
first controller. 

First model 6063/6064 fixed-head disk. 
For the first controller, n is 0, 1,2, or 
3. 

First moving-head disk or diskette 
controller drive. For the first 
controller, n isO. 1,2, or 3. 

Top-loading disk subsystem, which is 
two moving-head disks in one unit. For 
the first controller, n is 0, 1, 2, or 3. 

The top (removable) disk is DPn; the 
bottom (fixed) disk is DPnF. This 
controller can also support diskette 
units. 

6060 Series Disk unit, first controller. 
The 6060 is single-density, the 6061 is 
double-density, n is 0, 1 , 2, or 3. 

Dual processor input/output link. 
(Dual CPU/IPB systems only.) 

Line printer (80- or 132-coIumn). 



Devicename 



MCAR 



MCAT 



MTn 



SPLT 
SPTP 
SPTR 
GTY 



STTI 
STTO 

STTP 

S'TR 



Device 



Multiprocessor communications 
adapter receiver line. You address each 
line as :n, where n is a number; e.g 
MCAR:4. 

Multiprocessor communications 
adapter transmitter line. See .MCAR 
for the line name. 

First controller, 7- or 9-track magnetic 
tape. (Drive n is in the range 0-7.) The 
first file on a mag tape is 0. the second 
I, and so on. To access any file, use a 
colon followed h; the file number; e.g.. 
MT1:6. 

Incremental plotter. 

Paper tape punch. 

Paper tape reader. 

Asynchronous line multiplexor (AL.M) 
or data communications multiplexor 
(QTY). You address each line as ;n, 
where n is a number from to 63; e.g., 
QTY:13. 

Teletypewriter or CRT display 
keyboard. 

Teletypewriter printer or CRT display 
screen. 

Teletypewriter punch. 

Teletypewriter reader. 



2-4 



093-000109-01 



Licensed Material - Property of Data General Corporation 

If you have a second disk coniroller on your system, 
address it as follows: 



IMaGeieral 

SOFTWARE DOCUMENTATION 



DK1 

DSn 

DPn 
DPnr 



DZn - 



Second mode! 6001-6008 fixed-head disk. 

Second model 6063/6064 fixed-head 
disk controller (n is 4, 5. 6 or 7). 

Second moving-head disk controller (n 

is4. 5.6. or7). 

Top-loading unii with two disks. For 
the second controller, n is 4, 5. 6. or 7. 
The lop disk is DPn; the fixed disk is 
DPnF. 

6060-6061 series disk, n is 4, 5, 6. or 7. 



For a second nondisk device, simply append a 1 to the 

reserved filename; e.g.. 



SLPT1 



CTln 



Second line printer (80- or 
132-coIumn). 



Second cassette controller (n is in the 

range 0-7). 

^^T1 n Second mag tape controller (n is in 

range 0-7) and so on. 

Table 2-3 gives all DOS devicenames. 

Table 2-3. DOS Devicenames 



Devicename 



SCDR 
DPn 



Device 



SLPT 
SLPT1 

MTn 



SPLT 

SPTP 

SPTR 

QTY 

STTI 

$TTO 

STTI1 

$TT01 



Card reader 

Diskette drive n. For the first 
microNOVA controller, n isOor 1; for 
the second microNOVA controller, n is 
2 or 3; for the third and fourth 
controller, n is 4 or 5 and 6 or 7 
respectively. 

For other NOV.As, on the first 

controller, n is 0, 1,2, or 3. On the 
second controller, n is 4, 5, 6, or 7. 

First and second line printers. 

Magnetic tape unit n, nine-track tape, 
n is a number from to 7. 

Incremental plotter. 

Paper tape punch. 

Paper tape reader. 

Multiplexor. See QTY in Table 2-2. 

Console keyboard. 

Console screen or printer. 

Second console keyboard. 

Second console screen or printer. 



NondJsk Devices 

Before you can use magnetic tape or a cassette drive, 
you must initialize it with the INIT command; you can 
then access the files on it by devicename and file 
number. .After you have finished with it, be sure to 
RELE.ASE it from the system. (Both the INIT and 
RELEASE commands are covered in Chapter 4.) For 
example; 

INITMTO) 
LOAD/V MT0:3) 
RELEASE MTO) 

You must write fdes to mag tape or cassette in numeric 
order. If the tape is new, you should fully initialize it 
before using it: 

INIT/FMTn 

or 

INIT/FCTn 

This will write a double EOF mark on the tape. The 
double EOF tells the system where the logical end of 
the tape is, and detlnes the number of the next file to 
be written. INTT/F destroys all existing files on the 
tape. 

The first file on a tape is number 0. When you have 
finished file 0, the system writes a double e'nd-of-file 
mark on the tape; this defines the end of file 0. This 
process continues until you have written 99 files on the 
tape, or until the tape itself has run out. The system 
does not check the tape for existing files as it writes, 
and you should therefore keep careful track of the files 
and numbers on your tapes to prevent files from being 
overwritten. Assume, for example, that you have 
written six files on a tape which is mounted on unit 
MTO, and you carelessly issue a command like; 

DUMPMT0:2} 

The contents of current disk directory will overwrite 
the old file 2, destroying it and all following tape files. 

To access all other devices on your system, use their 
devicenames. You need not initialize or release them, 
but you may need to operate them manually during 
execution of a CLI command. For example, 

XFER SPTR MYFILE) 

requests that the CLI copy the tape in the paper tape 
reader to a new disk file named MYFILE. The CLI 
replies: 

LOAD SPTR, STRIKE ANY KEY. 

You then load the paper tape reader and strike any key 
on your console. (The key is not echoed.) 



093-000109-01 



2-5 



Nondisk Devices 



I^taGeneral 

SOFTWARE DOCUMENTATION 



Listing File 

Many system utility programs offer an /L switch, which 
directs the utility to send a listing of its output to a file 
other than the console. Generally, you'll be using this 
switch to specify either a disk file or the line printer. For 
example, the command 

MAC MYFILEOUTPUT/L) 

assembles MYFILE and sends the assembly listing to 
disk file OUTPUT. You can then TYPE or PRINT 
OUTPUT at any time. 

The command 

MAC MYFILE SLPT/L) 

assembles MYFILE and sends the listing directly to the 
line printer; the listing is not saved on disk. 

The command 

MAC/L MYFILE) 

assembles .MYFILE, creates a disk file named 
M's'FILE.LS (if it doesn't e.xist), and appends the 
assembly listing to .MYFILE.LS. As with the file 
specified by local /L. you can then TYPE or PRINT 
M'i'FILE.LS at any time. 

Disk Files 

A diskjs the best place for your working files. Access to 
a disk is faster and far more versatile than other media; 
you can give disk files descriptive names; you can 
organize disk files logically within directories; and vou 
can use any system utility on a disk file. (Although'the 
utility programs will operate on a nondisk file! they 
work inefficiently, and require special handling. The 
assembler utilities, for example, make two passers over 
the input, and this requires two passes through the 
paper tape reader for a paper tape source file.) 

Generally, we recommend using nondisk media only 
for backup, or lo store inactive files which would 
otherwise consume valuable disk space. 

A disk file can be a directory which contains other files; 
or ii can be a data file or program file; or it can be a link 
entry which contains nothing, but points to another 
file. 

Each disk file has a name (which its creator assigns) 
and one or more characteristics (which the system 
assigns). It can also have a two-character extension, 
and one or more protective attributes. Characteristics 
and atiributes are covered in the LIST and CH,4TR 
command descripiions (Chapter 4); names and 
extensions are explained next. 



Licensed Material - Property of Data General Corporation 

Disk Filenames 

A legal filename has between one and ten uppercase 
alphanumeric characters, including S. The name must 
be unique within its directory. The system will not 
allow you to create an illegal filename. For example 
take the GRAND command, which creates a random' 
file, and the LIST command, which lists filenames and 
file types: 



GRAND FIRSTFILE) 

R 

CRAND FIRSTFILE) 

FILEALREAD Y EXISTS:FIRSTFILE 
R 

If you try to create an existing filename, the system will 
refuse. 

CRAND #FILE) 

ILLEGAL FILENAME: # FILE 

R 

Try an illegal filename, and the system declines. 

If you try more than ten characters, the svstem will 
create the file: 

CRAND PROLONGEDFILENAME) 

LIST) 

FIRSTFILE D 

PR O LONG ED F D 

R 

but will include only the first ten characters. 

The system will not create a file with an existing name, 
an illegal name, or with a name larger than ten 
characters. .Although it appeared to accept 
PROLONGEDFILENAME, it actually accepted onlv 
the first ten characters and ignored the rest. 

Filename Extensions 

Filename extensions provide you with a fast, versatile 
way to access and identify the contents of your disk 
files. (Nondisk filenames are devicenames, and do not 
have extensions.) You can create an extension when 
you create or rename a disk file. .An extension is 
delimited by a period and consists of one or two 
alphanumeric characters (including S) followmg the 
filename. You can use any combination of these; for 
example: 

TEST. 

TEST.A 

TEST.A1 

The system, would regard each of these as a separate 
file, and permit you to create all of them in the same 



2-6 



093-000109-01 



Licensed Material - Property of Data General Corporation 

directory. If you enter more than two characters for an 
extension, the system will ignore the extra characters. 
Only the first two are signiftcani. For example: 

R 

GRAND TEST TEST.A TEST.A1 ) 

R 

GRAND TEST.A1BB) 

FILEALREAD Y EXISTS: TEST.A I BB 

R 

The system created the three Hies, but refused to 
create TEST.A IBB. which it saw as another TEST.A 1 . 

Bear in mind when you choose an extension that it will 
become part of the filename, and in most cases the 
system cannot access the file without it. You can use 
the LIST command, in conjunction with filename 
templates (described later), to refresh your memory 
and speed up access to different filenames and/or 
extensions. 

Generally, you can be quite free with extensions for 
nies which will hold groups of data (e.g., BILLS.J.A. 
BILLS. FB). For source programs, which will eventually 
become save files, processing will be easier if you 
follow system conventions. This means giving your 
source files the traditional extensions, or none. For 
assembly-language programs, the traditional extension 
is .SR, for FORTRAN programs, it's .FR, for ALGOL 
programs, it's .AL; for other languages, see your 
language reference manual. 

If you follow this practice, you'll never need to type an 
extension when when processing your source file with 
an assembler, compiler, or loader, to make it into an 
executable program. The final program always receives 
the extension .SV, but you needn't type the .SV 
extension to execute the program. (However, no 
program will run if you change or remove its .SV 
extension.) 

RDOS Utilities 

The following paragraphs describe the action of some 
program-development utilities. For more on the 
compilers, see the individual compiler command name 
in Chapter 4. 

ASM and MAC are assembler utilities; they expect a 
source file, written in assembly language,' with the 
extension .SR. If the file you want to assemble has any 
other extension, you must type both name and 
extension. The assemblers produce binary files from 
your source files. ASM and MAC usually name the 
assembled himfv filename. RB. The original source file 
(filename or filename.SR) remains intact after each 
command. 



I^taGeneml 

SOFTWARE DOCUMENTATIO!^ 

LFE is a library file editor: it allows you to create and 
edit library files, which are groups of binary files. A 
binary file represents an intermediate stage in program 
development: you produce a binary by assembling a 
source file with .AS.M or M.AC or compiling it with 
FORT, etc. LFE always searches for flename.RB or 
filename. LB. If the fileCs) you want to edit have any 
other extension, you must type both the filename and 
extension. The extension your edited output receives 
depends on the kind of editing you do. See LFE in 
Chapter 4 for more information. 

RLDR produces an executable save file by combining 
relocatable binary modules. RLDR expects each 
filename to have the .RB extension or none. If the 
filename(s) you want to load has any other extension, 
you must type both name and extension. The save file 
is always named filename. SV. and overlays (if you 
specified them) are placed in flename.OL. The original 
filenames (.RB, or .LB) remain intact. 

filename ) instructs CLI to execute the file named 
flename. CLI searches for a macro file (flename.MC):i( 
it does not find one, it searches for the save file 
(filename.SV). 



Disk Directories 

Within any system, each user needs disk space for files. 
Disk directories allow you to organize and assign file 
space flexibly, by user or category name. You already 
have some experience with these structures from 
Learning to Use Your R DOS/DOS System. 

RDOS Partitions and Subdirectories 

When a disk is introduced to RDOS, it has a given 
number of blocks available for storage (a disk block is 
256 16-bit words). These blocks make up an area called 
the primary partition. According to everyone's needs, 
sections of the primary partition can be logically 
detached and given different filenames. These discrete 
sections are called secondary partitions. Within the 
primary partition (and secondary partitions, if any) you 
can place smaller directories called subdirectories. You 
can create files in or move files to any partition or 
subdirectory. 

The file group in each partition or subdirectory is 
logically discrete, which means that files with identical 
names can exist in different directories. If you attempt 
to create, dump, load, move, or transfer ///e/ioOTe into a 
directory where flename already exists, however, the 
system will reject your command and return the 
message FILE ALREADY EXISTS: flename. 



093-000109-01 



2-7 



Disk Directories 



DataGeneral 

SOFTWARE CX}CUMeMTATJON 

Generally, the RDOS system uiiliiy files were placed in 
the master directory (primary partition) during svsiem 
generation. If you want to use these from ^another 

directory, you must either link to them via the LINK 
command, or use directed access to them. 

Figure 2-1 shows disk Dxx before and after partitioning 
and file creation: it also gives the CLI commands 
required to do the partitioning. Dx.x can be any of the 

disks in Table 2-2; to determine its name, type MDIR). 

Partitions and subdirectories are files which can be 
shared by several users and by foreground and 
background program.s. All but the primary partition can 
be deleted. Any command you can execute on a 



Licensed Material - Property of Data General Corporation 

partition will affect its subdirectories and files, and any 
command made upon a subdirectory will affect its files. 
All directory commands are summarized at the 

beginning of Chapter 4. 

DOS Directories 

In DOS, there are no secondary partitions. Each 
diskette is a primary partition, on which you can create 
logical subsets of file space called direaones. DOS 
directories are the same as RDOS subdirectories. The 
files created in (or moved to) each directory are 
logically separate from those outside it. Figure 2-2 
shows a diskette with sample directory structure, and 
the CLI commands which created the directories. 




SD-OOSG!-A 



llJl ()%f\HM)S (R PROMPT CMITTEDI 

DiROxx: 

OPART SECONOPART 1600: 

OIRSECONDPART., 

CDIR SUBDlR OlRSUBOlR': 

GRAND FILENAME" 

OlHOxx] 

COIRSUBDIRA- 

OtRSUBOlHA; ' 

GRAND FiLENAMEAi 

DlRDnxj 

GRAND filenames; 




Figure 2- 1. Apportioning Disk Space 




(IJCOMMAM)S IR PROMPT OMITTEDI 

DIR DPn) 

GRAND FILENAMES} 

CDIR SUBDlR; DIR SUBDIR' 

GRAND FILENAME: 

DIR DPn) 

COlR SU8DIRA: DIR SUBDIRA'i 

GRAND FILENAMEA! 




figure 2-2. Apportioning Diskette Space 



2-8 



093-000109-01 



Licensed Material - Property of Data General Corporation 

Directory Names 

Tables 2-2 and 2-3 explain disk and diskeue primary 
partition names. Other directory names must conform 
to system rules for filenames: up to 10 alphanumeric 
characters, including S. Whenever you create a 
secondary partition or subdirectory, the system 
assigned the extension .DR to it. 

To prevent confusion, and logical mixups, the system 
does not permit two directories of the same name to be 
initialized at the same time. This is true even if the 
directories are on different partitions, on different 
disks, or operating in different grounds. 

When a system has more than one directory with the 
same name, the first one initialized will become the 
version; no matter what directory specifiers you use to 
select the other version, the CLI will return to the first 
version - often without an error message. Before you 
can initialize the second version, you must release the 
first. 

All this may perplex you or other users: anyone coming 
on the system may inadvertently find himself in the 
wrong version of a directory, and innocently destroy or 
move files. To prevent these problems, we 
recommended that you give every partition and 
subdirectory (or DOS directory) a unique name. 

Directory and File Access 

To help understand this section, assume that you are 
starting from a cold system, and that you want to type 
the contents of file FILENAME in Figure 2-1 (Figure 
2-2 for DOS). FILENAME is a random file, created in a 
subordinate directory called SUBDIR. You begin by 
bootstrapping (bringing up) the system, and enter the 
date and time; you then receive the R prompt. 

Before you can access FILENAME (or any file in your 
system), you must "turn on" the directory which 
contains it. This step is called initialization; once you 
have initialized a directory, the system remembers 
where it is, and can access it directly - even if it is on 
another disk. Bootstrapping automatically initializes the 
master directory. FILENAME is not in the master 
directory; it is in a subordinate directory, and you must 
initialize this directory before you can access it. 

You can use one of two commands to "turn on" a 
directory: INIT or DIR. INIT simply initializes the 
directory, while DIR initializes it and makes it the 
current directory. The CLI is directly aware of files in 
the current directory, and can access them without 
directory specifiers. At any moment, many directories 
can be initialized, but only one can be the current 
directory. Your choice of INIT or DIR will depend on 
where you want the current directory to be. (If you 



E^General 

SOFTWARE DOCUMENTATfON 

forget the name of the current directory, type the 
command GDIR. and the CLI will return its name.) 

To turn on FILENAME'S directory, SUBDIR, you 
could type the following series of commands: 

For R DOS: 

DIR for INIT) SECONDPART} 
DIR (or INIT) SUBDIR) 

For DOS: 

DIR (or INIT) SUBDIR) 

If you chose DIR, the current directory becomes 
SUBDIR; if you used INIT, the current directory would 
remain the master directory. In the RDOS example, 
you could have saved time by typing one command: 

DIR (or INIT) SECONDPART:SUBDIR) 

The directory specifier SECONDPART: directs the CLI 
to execute the command on SUBDIR. Any directory 
specifier points to the directory or file which follows it; 
it is an essential file access tool. 



While SUBDIR is initialized, 
accessible from anywhere in 
directory specifier: 

SUBDIR:FILENAME 



FILENAME 

the system 



will be 
via the 



If the current directory is SUBDIR, you can omit the 

directory name, and simply specify: 

FILENAME 

Thus, if you had "DIRed to" SUBDIR, you could type: 

TYPE FILENAME) 

But if you had INITed SUBDIR, the current directory 
would remain the master, and you would need a 
directory specifier in the command: 

TYPE SUBDIR:FILENAME) 

Note that you can never access or execute a file outside 
the current directory without preceding its name with a 
directory specifier, unless you have linked to it. 

After you have DIRed to or INITed a directory, it 
remains in the system until you RELEASE it. Now that 
SUBDIR has been turned on, you can execute most 
CLI commands on any file from any directory, by 
typing: 

COMMAND SUBDIR:file-in-subdir 



093-000109-01 



2-9 



Disk Directories 



DataGoieml 

SOFTWARE CX)CUMENTATION 

For example: 
DIRDP7:0BSCUREDIR) 



TYPESUBDIR:F1LENAME} 



(contents of FILENAME) 
R 



(Assume that your system 
has a DP7, with a 
directory called 

OBSCUREDIR) 

(The system remembers 
the location of any 
initialized directory.) 



During any CLI session, you can DIR to or INIT each 
directory as you need to access files within it. If you 
reach the system limit of initialized directories, you'll 

receive an error message: 

DiRLIMITPLUSi) 

OVT OF DCBS: LIMITPLVSI 

The OUT OF DCBS message means that you have 
reached the maximum number of directories, as 
determined during system generation. To initialize the 
directory which evoked the error message, you must 
RELEASE a previously-initialized directory. 

Releasing a directory turns it off; releasing a partition 
or diskette also turns off any directories it contains. 
"J'ou can RELE.4SE a directory from within it. For this 
example, you can RELEASE all directories, and sign 
off the system, by typing: 



RELEASE l^^'^ 



■4 



} 



The system would then verify the message and shut 

down: 

MASTER DEVICE RELEASED 

You cannot RELEASE a directory while any of its files 
are in use by another program (this can happen in 
RDOS only). If a foreground program is running, and 
you try to release a directory which it is using, CLI will 

display an error message. We describe 
foreground/background programming at the end of 
Chapter 3. 

During this (or any) CLI session, no harm would have 
been done if you had made an error' in any of these 
steps. The CLI would simply have returned an error 
message; for example, if you had tried to TYPE 
FILENAME from the wrong directory: 

DIR %MDIR%; TYPE FILENAME) 
FILE DOES SOT EXIST: FILES A ME 
R 



Licensed Material - Property of Data General Corporation 

(No FILENAME exists in the master directory 
%MDIRyo signifies the master directory name; we 
describe it in Chapter 3.) 

Or if you had tried to initialize a previously initialized 
directory: 

DIRSUBDIR) 

R 

INITSUBDIR) 

DEVICE ALREADY IN SYSTEM: SUBDIR 
R 

Or if you had tried to release a directory which was not 
initialized: 

RELEASE SUBDIR) 

R 

RELEASE SUBDIR) 

NO SUCH DIRECTOR Y: SUBDIR 
R 

To the system, a released directory does not exist. 



Filename Templates 

As the number of files in your system grows, and vou 
assign extensions to help identify certain file categories, 
it is handy to have some way to access files by one or 
two characters in their names. 

The CLI offers two template characters to help vou 
access similar filenames. When you use one or both of 
these characters with a filename in a command, the 
CLI executes the command on all matching filenames 
in the current directory. Templates are very useful in 
conjunction with filename extensions. 

A filename template may contain either or both of the 
following characters: 

• Asterisk - represents any single character, except a 
period, in a filename or extension. 

- Dash - represents any string of characters, except a 
period, in a filename or extension. 

For example, assume that the following filenames are 
in the current directory: 

A 

ATOM 
A2SM 
ADAMS 

ADAMS. SR 
ADAMS. RB 
ADAMS.SV 



2-10 



093-000109-01 



Licensed Material - Property of Data General Corporation 

Since the asterisk represents any single character 
except a period in a filename, the command 

LISTA*'M} 

would list all four-letter filenames beginning with A 
and ending with M. These are ATOM^and A2SM. A 
and ADAMS would not be listed because they are not 
four letters long. Also neither ADAMS.SR. 
ADAMS. RB, nor AD.AMS.SV would be listed because 
each has a period and extension: the template 
.•\'*MS.*" would access them. 

Since the dash represents any character string of rtwor 
more characters in a filename or extension" (except a 
period), the command 

LIST A-} 

would list all filenames shown without extensions. LIST 
-.*- would access all filenames with one- or 
two-character extensions. The template -M would 
access ATOM and A2SM, and template A-.- would 
access all names shown. The command LIST -.-} would 
list all nonpermaneni files in the current directory. 

Occasionally, as you work with the CLI, you will forget 
the names of pertinent files or even directories. 
Templates and the LIST command can help you with 
any of these situations. For example, consider the disk 
structures in Figures 2-1 or 2-2. If you were new to this 
disk, and would like to learn its directories, you'd type: 



SOFTWARE DOCUMENTATION 



TEST.] 40 


D 


TEST. I 60 


D 


TEST. I A m) 


D 


TEST. 2 400 


D 


and so on. 




R 





If you decided that you would like to save two versions 
of TEST, you would protect them with the permanent 
attribute and delete the others: 



■PTEST.3A ^P} 



CHATR TEST.2 
R 

DELETE/VTEST.-} 
DELETED TEST 
DELETED TEST J 
DELETED TEST. L4 
PERM AS EST FILE: TEST. 2 
DELETED TEST. 3 
PERMANENT FILE: TEST. 3 A 
DELETED TEST. 4 



The CLI has deleted all files which match the template, 
except those which you CHATRed permanent, and 
verified the deletions. You could check this with 
another LIST template: 



LIST/A TEST.-} 
TEST.2 400 PD 
TEST 3 A 460 PD 
R 



LIST-.DR} 

SECONDPARTDR 8I9200CTY 

SUBDIR.DR 512DY 

R 

For DOS (Figure 2-2) the figures would be: 



SUBDIR.DR 
SUBDIRA.DR 

R 



512 DY 
512 DY 



You could ^ then DIR to each directory, and LIST its 
files. In this example, the system-assigned extension 
.DR was useful. 

Assume that during a CLI session, you created many 
small files. Knowing that you would eventually want to 
delete most of them, you gave them the same name 
(TEST) and different extensions. At the end of the day 

you'd type: 

R 

LIST/A TEST.-} 



There are some restrictions on the use of templates: 

• The filename you use in the template must be in the 
current directory. You cannot use templates with a 
directory specifier. 

• You may use templates only in the following 
commands: 

BUILD DUMP MOVE 

LIST UNLINK 

DELETE LOAD 

If you try a template in any other command, the CLI 
will return an "illegal filename" error message. 



Link Entries 

Link entries save disk file space by allowing users in 
different directories to access a single commonly-used 
disk file: this is their most useful application. A link 



093-000109-01 



2-11 



Filename Templates 



DataGeneral 

SOFTWARE DOCUMENTATION 

entry is a filename in one directory which points to a 
file (called the resolution file) in another directory, or 
loanother link entry. 

With the link entry, you can access any file on any disk 
as if it were in your own directory (assuming that its 
attributes permit linking; for more on this, see the 
CHLAT command). You create a link entry with the 
LINK command, delete it with the 'UNLINK 
command, and change a file's link access attributes 
with the CHLAT command. See LINK for more detail. 

System Console Breaks 

You can enter three program breaks from the system 
console: CTRL-A, CTRL-C, and CTRL-F. CTRL-F 
terminates the foreground program; we discuss it in 
Chapter 3. CTRL-F doesn't pertain to DOS. 

CTRL-A terminates most executing CLI commands 
and returns the "R" prompt. It also terminates 
execution of all utility programs (except editors) and all 
user programs, unless you have built a different 
interrupt routine into a program, as described in 
Chapter 3 of your system reference manual under 
"Keyboard Interrupts'". After you type CTRL-.A, the 
system displays the word -/AT on the console; then, 
generally, it invokes the CLI. 



For example: 




A) DIR%MDIR%} 




R 




LIST) 




SYS.SV SD 


39424 


DSKED.SV SD 


12288 


RLDR.OL C 


22464 


CLl.SV SD 


J 0240 


CLI.OL C 


33008 


CTRL-A 




-INT 




R 





CTRL-A aborts the listing and saves nothing. 
B) ASM MYSOURCE) 

PROGRAM IS RELOCA TABLE 
.TITLMYSOU 

CTRL-A 

INT 

R 

CTRL-A aborts ihe assembly; file MYSOURCE 
remains intact. 



Licensed Material - Property of Data General Corporation 

directory. (In an RDOS mapped system, a trap will also 
produce BREAK.SV.) You cannot execute BREAK SV 
directly, but you can use it for assemblv-laneuage 
debuggmg. For more on this file, see .BREAK in 
Chapter 3 of your system reference manual. After you 
type CTRL-C, the system displays the word BREAK on 
the console; then, generally, it invokes the CLI. 

In the following example, MYPROG is a user program 
with problems: 

MYPROG) 



(here, a delay occurs which means that MYPROG isn't 
running properly) 

CTRL-C 

BREAK 
R 

The system places BREAK.SV in the current directory 
(deleting any existing version first); MYPROG. SV 
remains intact. 

Error Handling 

Generally, the CLI will abort any command (except 
DELETE) that threatens an existing file. If it cannot 
obey a command for any reason, it will try to explain 
the reason, and will usually display-the arcumeni which 
caused the problem; e.g., ' 

GRAND MYFILE; CRAND MYFILE) 
EILE ALREADY EXISTS: MYFILE 



Reason 



•Argument which 
caused the 
problem 



NOTE: 



CTRL-C also interrupts an executing CLI command or 
Program,^but saves the memory image in a file called 

is placed in the current 



BREAK.SV. BREAK.SV 



This is not necessarily true when you execute 
a program or utility via the cLi. See the 

explanation in the next section. "'Usinc 
.ERTN." 



In most cases, when you enter a command which is 
legal for some arguments and illegal for others, the CLI 
will execute all legal arguments before ii returns the 
error message: 

CRAND A A# B B&) 
ILLEGAL FILENAME: A # 
ILLEGAL FILENAME: B& 
R 

LIST*) (Were .A and B created?) 

A OD 

B OD (Yes) 

R 



2-12 



093-000109-01 



Licensed Material - Property of Data General Corporation 

Most error messages result from forgeifulness - 
forgetting to initialize a directory, forgetting the 
location of a file, or forgetting the required7ormat of a 
command. Although errors may be inconvenient, they 
are all harmless; the fact that the CLI could interrupt 
and respond to the error indicates its harmlessness. 
Generally, the message you receive will allow you to 
correct the ejror easily. Appendix A contains a 
complete list of CLI error messages and their causes. 

Here are some instructive error examples. For 
foreground/background examples, see the end of 
Chapters. 

RENAME ASM.SV ASSEMBLER SV) 

R 

ASSEMBLER MYFILE) 

FILE DOES NOT EXIST: ASM.SV 

R 

Some system utilities won't work if you RENAME 

them. 

CHATR SLPTO) 

FILE A TTRIBUTE PROTECTED: SLPT 
R 

The attributes of certain files in your system were set 
and fixed at Data General, and cannot be changed. 

LINK ASM.SV DPOrASM.SV) 
R 

LINK ASM.SV OTHERDIR) 

FILE ALREADY EXISTS: ASXLSV 
R 

A link entry is a file, and two files with the same name 
cannot occupy the same directory (you could create a 
link entry with a unique name to OTHERDIR). 

DIRDPO) 

R 

DUMP DPI :F00} 

FILE SPA CE EX HA USTED: DPI: FOO 

R 

All material on DPO won't fit into the unused file space 

on DPI. 



I^taGeieral 

SOFTWARE DOCUMENTATION 

The Text Editor program doesn't exist in directory 
MYDIR. Generally, during system generation, all 
system utilities were placed on the directory which 
holds the operating system. You can use link entries to 
access them from any other directory. 

Using .ERIN 

In your assembly-language programs, you can instruct 
the CLI 10 interpret errors with the system call .ERTN. 
If a program encounters an error which prevents it 
from proceeding, it may take the error return through 
.ERTN. If so, the CLI will interpret the system error 
code that is always returned in AC2, and display an 
error message on the console. 

The CLI also tries to describe the argument which 
caused the error, as in the GRAND example above. 
However, the argument which follows the colon will 
always be the name of the program which took the 
error return. (This is true because the CLI is not active 
when the program encounters the error, thus the CLI 
does not know what the specific problem was; all the 
CLI can do is interpret the code in AC2). 

For example, assume the program .MYPROG.SV 
needs to read a file named DAT.AL If .MYPROG can't 
find DATAl, and MYPROG takes the error return 
through .ERTN, this message will appear on the 
console: 

FILE DOES NOT EXIST: MYPROG.SV 



Interpretation of 
error code in AC2. 



Program which took 
error return. 



NOTE: Most of the Data General utility programs 
(e.g., MAC, SYSGEN, FORT) also use 
.ERTN. When they encounter a fatal error, 
they return to the CLI and the CLI interprets 
AC2 exactly as it would for a user program. 
This can be confusing at times. Use thel.IST 
command to check for the existence of the 
files involved. 



DIR MYDIR) 

R 

EDIT MYFILE) 

FILE DOES NOT EXIST: EDITS V 
R 



093-000109-01 



2-13 



Filename Templates 



DataGeneral 

SOFTWARE DOCUMENTATION 

Traps and System Errors 

If your system halts unexpectedly, it may have 
encountered an Exceptional Status condition. This is a 
critical hardware or software error. See the Exceptional 
Status appendix of your system reference manual for 
more on these errors. 

In a mapped RDOS system, certain errors in a program 
will halt the program and invoke the CLI, displaying 

the message: 



Licensed Material - Property of Data General Corporation 

TRAP xxxxxx xxxxxx xxxxxx xxxxxx xxxxxx 
BREAK 

R 

on the console. These user errors often involve endless 
loops OT illegal access to system devices. Break file 
BREAK.SV is placed in the current directory. See the 
Exceptional Status appendix of the RDOS manual for 
more on traps. 



End of Chapter 



2-14 



093-000109-01 



Licensed Material - Property of Data General Corporation 



I^taGeneral 

SOFTWARE DOCUMENTATIOIM 



Chapter 3 
Advanced Features 



This chapter describes some of the more complex CLI 
and operating system features. It begins by showing 
you how to write compact command lines with 
parentheses and angle brackets, then describes CLI 
variables, indirect commands, and macros. (You 
already have some experience with CLI macros from 
Learning to Use Your R DOS/DOS System. ) 

It then explains the CLI-system interface, and covers 



dual programming (RDOS systems only). 

None of the features described in this chapter are 
essential; you can use the CLI without them. They 
represent shortcuts and ways to exercise the power of 
the CLI and your system. 

You'll be using the symbols in Table 3-1 to write 
compact command lines, use variables, and create 
indirect files and macros. 



Symbol 



(„„) 



< > 



% 



.MC 



Table 3-1. Advanced CLI Symbols 



Feature 



Example 



Place multiple commands or 
arguments in parentheses, and 
separate them by commas. 

Use angle brackets for in-line 
expansion of multiple arguments. 



Enclose variables, whose values you 
want the CLI to supply, in % signs. 

Use commercial at signs to indicate 
an indirect command or file. 



Use the .MC extension to define a 
macro fife. 



(PRINT.DELETE) LOG.CM) 



PRINT DP1:<TEST<01 02 03>> 



MESSAGE %TIME%) 
XFER/A STTI FOO) 

ASM ®F00@) 



XFER/A STTI MYCOMMAND.MC) 



MYCOMMAND) 



093-000109-01 



3-1 



Advanced Features 



I^feGoieral 

SOFTWARE DOCUMENTATION 

Writing Compact Command Lines 

Angle brackets < > and parentheses ( ) allow you to 
enter complex commands to the CLI in an abbreviated 
form. The CLI will expand these command lines 
according to certain rules and then try to execute the 
expanded lines. By combining parentheses and angle 
brackets properly, you can execute complex command 
sequences with a minimum of typing at the console. 



For example, the CLI expands the command line 

MAC (<MY,YOUR>FILE) SLPT/L 

to the commands: 

MAC MYFILE SLPT/L;MAC YOURFILE SLPT/L 

General Rules 

You must match each opening parenthesis with a 
closing parenthesis, and each opening angle bracket 
with a closing bracket. Parentheses can appear within 
angle brackets - i.e., <()>- and vice versa - i.e., (< >) 
- but you cannot overlap the sets: < (>) is illegal. 

The CLI evaluates the parts of a command string in the 
following order: 

1. Text strings in quotes (MESS.AGE command). 

2. Indirect files or variables (described below). 

3. Angle brackets. 

4. Parentheses 

5. Numeric switches. 

6. Text arguments outside quotes (MESS.AGE 
command). 



Licensed Material - Property of Data General Corporation 

one set of parentheses in a line, it extracts 
arguments in turn from each set of parentheses 
For example, the line (LIST. PRINT) (FILEA.FILEB)} 
expands to: 

LIST FILEA 
PRINT FILEB 

After each argument in a set of parentheses has 
been used once, no argument in that string will be 
used again. For example, the command 

(LIST.PRINT.TYPE) (FILEA.FILEB)) 
expands to: 

LIST FILEA 
PRINT FILEB 
TYPE 

and would evoke an error message, because TYPE 
requires an argument. 

4. Nonparenthesized arguments are executed 
sequentially, as usual. For example, the line 

(LIST.PRINT) TEST (FILEA.FILEB)) 

expands to: 

LIST TEST FILEA 

PRINT TEST FILEB 

5. Processing ends when the CLI has tried to execute 
all arguments from the parenthesized set which 
contains the greatest number of arguments. 



Parentheses 

Parentheses expand a command line into multiple 
command lines, creating one additional line for 
arguments within each set of parentheses. .Arguments 
not in parentheses are executed as usual. Parentheses 

must be paired, and cannot be nested. 

Other Rules 

1. You must separate each argument within a set of 
parentheses from the next with a comma- e g 
{A,B,C). 

2. The CLI extracts argument strings from 
parentheses left to right. 

3. You can use more than one set of parentheses in a 
single line. When the CLI encounters more than 



More Examples 



Command 



(PRINT.DELETE)LOG.CM) 

DUMP/V MT0:(0.1.2) (A.B.O) 

MAC (A.B) fSLPT.OUT.LSiVL) 
MAC All. 2) (SLPT.OUT.LS)/L) 

MAC (.A.B) OURS SLPT/L) 



Expands to: 



PRINT LOG, CM 
DELETE LOG, CM 

DUMP/V MTO:0 A 
DUMP/V MT0;1 B 
DUMP/V MT0:2C 

MAC A SLPT/L 
MAC B OUT.LS/L 

MAC AT SLPT/L 
MAC A2 OUTXS/L 



MAC OURS SLPT/L 
MAC A OURS SLPT/L 
MAC SOURS SLPT/L 



3-2 



093-000109-01 



Licensed Material - Property of Data General Corporation 



SOFTWARE DOCUMEf^TATION 



For a more complex example, take: 

MAC/U DP4:(TEST,A,B.C) OVLY LISTDIR:(TEST.A.B.CI/L) 

This assembles four files from DP4, and file OVLY 
from the current directory, with user symbols; it 
places the listings in directory LISTDIR. The 
expanded command is: 



MAC/U DP4:TEST OVLY LISTDIR:TEST/L 
MAC/U DP4:A OVLY L!STDIR:A/L 
MAC/U DP4:B OVLY LISTDIR:B/L 
MAC/U DP4:C OVLY LISTDIR;C/L 



Angle Brackets 

The arguments enclosed in angle brackets are 
expanded into a single command line. Arguments not 
in brackets (or parentheses) are executed as usual. You 
can nest angle brackets lo any depth, but they must be 
paired. 

Other Rules: 

L You can separate each argument within angle 
brackets from the next with one or more commas 
or spaces; e.g., <l,2 3>. Multiple commas or 
spaces indicate a null argument; e.g., <1„2 3>. As 
an example, CRAND FILE < A.B.C > } expands to: 

' CRAND FILEAFILEBFILEC 

CRAND FILE < 1 .2, > } expands to: 

CRAND FILE1 F1LE2 FILE 

2. You can use multiple sets of angle brackets in 

command lines. For example, 

CRAND TEST < 1 2 > TESTA < 1 2 > } 

creates 

TEST1 . TEST2. TESTA1 . and TESTA2, 

3. When you nest angle brackets, the CLI expands the 
innermost level first, then proceeds toward the 

outermost level. Within each level, arguments are 
expanded left to right. Within nested brackets, a 
left or right bracket delimits each bracketed string. 
For example, 

PRINT DP4:<TEST.<01 02 03>>) 

expands to 

PRINT DP4KTEST01 TEST02 TEST03> 

and then to four PRINT commands. 



4. An argument string within a level is concatenated 
to each argument string at the next outer level. For 
example, see 3. 

5. If the argument string delimiter is a comma or 
space, it is concatenated to the end of the new 
string. If the delimiter is a bracket, it is treated as a 
null. For example, see 3. 

More Examples: 



Command 


Expands to: 


PRINT <ABC>.SR) 


PRINT A, SR B.SRC-SR 


PRINT DPO:<ABC>.SR) 


PRINT DPOiA.SRI) 




DPO:B.SROP0;C.SR 


PRINT DPI :|) 


first step: 


<<ABC>.SR <DE>.LS>} 


PRINT DPI :<A.SR|} 




B.SRC.SRD.LSf) 




E.LS> 




second step: 




PRINT DP1;A,SRI} 




DP1:B.SR!} 




DPliC.SRI) 




DP1;D.LS|) 




DP1:E.LS} 



A handy way to learn how to construct compact 
command lines is to experiment using the 
MESSAGE command. 

MESSAGE DP0:<A,B(1.2,3)C,D>.SR} 
DPO.-A.SR DP0:B1C.SR DPO:D.SR 
DPO:A.SR DP0:B2C.SR DPO:D.SR 
DPO.-A.SR DP0:B3C.SR DPO:D.SR 

See Chapter 4 for more information on MESSAGE. 

Expansion Example 

For a useful example, assume that you have created 
two programs, named RECAST. SV and 

REEXAMINE.SV. RECAST searches for a file, sorts 
it, and prints a sorted copy; REEXAMINE searches for 
certain features in a file, and prints them. Both 
RECAST and REEXAMINE will operate on an 

indefinite number of files and will thus accept many 
filename arguments in a command. Whenever you 
create a file that you plan to RECAST or 
REEXAMINE, you assign it to a category, and give it a 
category name; you use extensions to distinguish files 
within each category. Assume that after several days 
you have these files to be RECAST and 
REEXAMINED: 

ACCTSDUE.V1 .ACCTSDUE.V2 
ACCTSDUE.V3,ACCTSDUE.V4 
LAWSUITS.V1 ,LAWSUfTS.V2 

CREDIT.V1.CREDIT.V2 
APOLOGIES.V1,APOLOGIES.V2,APOLOGIES.V3 



093-000109-01 



3-3 



Writing Compact Command Lines 



EfetaC^eral 

SOFTWARE DOCUMENTATION 

You would then be ready lo combine parentheses and 
angle brackets in a helpful and meaningful way: 



(RECAST.REEXAMiNE)ACCTSDUE.V<l2 3 4>l} 
LAWSUITS.V<1 2>|} 
CREDIT.V<1 2> AP0L0GIES.V<1 2>} 

This command line would print RECAST and 

REEXAMINEd versions of the ten files - thus 

executing 20 operations sequentially from one 
command line, in this order: 



RECAST ACCTSDUE.V1 
RECAST ACCTSDUE.V2 



RECAST LAWSUITS.V1 



RECAST CREDIT.V1 



Licensed Material - Property of Data General Corporation 

REEXAMINE is the second command; CLI would 
execute it on the ACCTSDUE files, and on the second 
argument within the parenthesized expression. The 
second argument expands to all LAWSUITS and 
APOLOGIES files. 

Thus the command sequence is: 

RECAST ACCTSDUE and CREDIT files. 

REEXAMINE ACCTSDUE, LAWSUITS and APOLOGIES 
files. 

Variables 

The CLI assumes a variable when it encounters a 
character string enclosed in percent signs (%). When 
the CLI encounters a legal variable, it replaces the 
variablename with the current value of the variable. If 
you had bootstrapped your current system on DPO, for 
example, the command line RELEASE %MDIR%) would 
evaluate to RELEASE DPO). Variables are most useful 
within indirect or macro commands and with the 
message command. The CLI recognizes the following 
variable names: 



RECAST AP0L0GIES.V2 
REEXAMINE ACCTSDUE.V1 



REEXAMINE LAWSUITS. VI 



REEXAMINE CREDIT.V1 



REEXAMINE AP0L0G1ES.V2 



^'ou could carry this even further and use nested angle 
brackets and parentheses to select the cateeories vou 
wanted RECAST and REEXAMINEd. .Assume, 'for 
example, that you v%-anied to RECAST ACCTSDUE 
and CREDIT, and REEX.A.MINE everv cateeory but 
CREDIT. You'd type: 



(RECAST.REEXAMINEI ACCTSDUE.V<1 2 3 4>|) 
ICREDIT.V<1 2>. < LAWSUITS APOLOGIES > \) 
V<1 2») 

RECAST is the first command; the CLI would execute 
it on the four .ACCTSDUE files, and on the first 
argument within following parenthesized sections. The 
first argument in the followme section expands to 
CREDIT.Vl and CREDIT.\'2. 



When the CLI 
encounters 
this variable 
name: 



%DATE% 
%GCIN% 
%GCOUT% 
%GDIR% 

%LDIR% 

%MDimo 

%FGND% 

%TiyE% 



It inserts this value: 



Today's date, in the form mm-dd-yy. 

The input console name (e.g., STTI) 

The ouipu! console name <'e.g.. STTO) 

The current directory name 
(e.g..SUBDIR) 

The name of the previous current 

directory (e.g., DP4). 

The ma.sier direciorv name (e.c , 
DPO). 

The character "F" if CLI is executing 
in the foreground: nothing if CLI is 
executing in the background. 

The lime of day, in the form hh:mm:ss. 



Indirect and Macro Commands 

The CLI offers the indirect and macro mechanisms to 
help you create and use your own compound 
commands. Both mechanisms involve building a file 
from several CLI commands, and thereafter 



3-4 



093-000109-01 



Licensed Material - Property of Data General Corporation 

referencing ihe file by the single filename which you 
have assigned to the group. To use the macro feature, 
you must assign the extension .MC to the filename 
which will contain your commands. 

Within your special command file, you can use 
templates, parentheses, angle brackets, and variables. 

Assume that you normally want to do the following at 
the end of each CLI session: 



delete listing files 

list your nonpermanent files 

determine how much disk space you have left 

close, print, and delete the log file 

release the master device. 



The commands required to do all this would be: 

DELETE/V -.LS; LIST/E; DISK; ENDLOQ-f ) 
(PRINT.DELETE) LOG. CM; RELEASE %MDIR%} 

You could save time and effort by writing these 
commands into a single file, which you m.ight call 
DAYSEND. To build this file, you would transfer your 
own console input into file DAYSEND with the XFER 
command (you could also use a text editor utility): 

XFER/A STTI DAYSEND) (/A specifies ASCII 

transfer.) 
DELETE/V-.LS; LIST/E/A; DISK; I } (These are the 
ENDLOG; (PRINT.DELETE)f } commands which 

RE^A^MD.R%) SilD) "' 

CTRL-2 (CTRL and Z 

indicate a STTI 
end-of-file, and 
return control to 
CLI.) 
R 

You could then execute the entire command group by 

typing: 

©DAYSEND®} 

The commercial at signs instruct the CLI to access the 
contents of the filename, instead of the filename itself. 
Note how this mechanism applies in this example: 

BUILD DUALFILE FILEA FILEB) 

This command builds an file named DUALFILE 
consisting of filenames FILEA and FILEB. You could 
verify the build with the command: 

TYPE DUALFILE) 

FILEAJILEBl 

R 



DataC^neml 

SOFTWARE DOCUMENTATION 

But if you enclosed DUALFILE in @ signs, the 

contents of FILEA and FILEB would be typed:" 

TYPE SDUALFILEi) 

(contents of FILEA) 

(contents of FILEB) 
R 

A different way of creating your own command file is to 
m.ake the command filename recognizable as a macro 
to the CLI. You can do this by appending the extension 
.MC to the filename when you build it. For the indirect 
file DAYSEND, above, the file-creating sequence 
would be: 

XFER/A STTI DAYSEND. MC) 
DELETE -.LS; LIST; DISK; etc. 

CTRL-2 
R 

The command DAYSEND) would then execute the 
group. 

When you enter a character string within @ signs, the 
CLI scans the current directory for the string. When 
you enter a string without @ signs, and the CLI cannot 
recognize the string as any of its commands, it searches 
for siring.MC. If it can't find string.MC, it searches for 
string.SV. (If you have both a macro and save version of 
string in the current directory, you can execute the save 
version by typing string.SV) .) 

A macro differs from an indirect command in two ways: 
1) it requires the .MC extension, and 2) it must be 
self-contained. You cannot execute any CLI command 
on a macro because a macro is by defmition a 
command, and must be the first word in a command 
line. You can, however, use an indirect filename as an 
argument to a CLI command. For a useful example of 
this distinction, assume that you have three source files 
PARTI, PART2, and PART3. You use XFER to build 
the three files into a file called TEST: 

XFER/A STTI TEST) 
(PARTI. PART2.PART3)) 
CTRL-Z 
R 

The command ASM ©TEST® will assemble the three 
files, as if you had issued these commands: 

ASM PART1 ;ASM PART2;ASM PARTS) 

The macro version of TEST would not work in this 
example; the command line ASM TEST.MC) would 
instruct the system to assemble TEST.MC. 



093-000109-01 



3-5 



Variables 



SOFTWARE DOCUMENTATION 

The conienis of either an indirect or macro file may in 
turn point to other files. For example, assume that 

file A (or A.MC) contains L « B § 
file B contains I i C @ 
file C contains ST 

Then the command g A 3 ) (or A) for the macro) would 
be equivalent to LIST). 

To build file A (or A.MC), you would need to use 
indirecis: 

XFER/A STTI A) (A.MC for the macro version) 
LSBd}CYou could also enter the .MC extension for 
indirect file B - e.g. L SB.MC S ) 

CTRL-Z 

R 

XFER/A STTI B) 

ItCt) 

CTRL-Z 

R 

XFER/A STTI C) 

ST) 

CTRL-Z 

R , 

When you typed @A@} (or A) for the macro version), 
the CLI would reference the contents of A - which is L 
- and the contents of B. B contains I and the contents of 
C, which is ST; hence the LIST command. When you 
use an indirect to call another indirect in this way, 
remember that each carriage return in an indirect file 
will act as a command delimiter when the file is 
executed. In the first example below, a RETURN in file 
A produces a meaningless command; in the second 
example, file A is built correctly. 



1. XFER/A STTI A) 
LIS} 

CTRL-Z 

R 

XFER/A STTI 8} 
T) 



(This RETURN delimits the 
command siring.) 



(The RETURN doesn't 
matter here, because this is 
the last character in the last 
file.) 

CTRL-Z 

R 

(Try to execute the indirect files.) 

@A@@B@) 

FILE DOES NOT EXISTiLIS.SV 

FILE DOES NOT EXIST: TSV 

R 

(The command string was LIS -delimiter- T. ) 



Licensed Material - Property of Data General Corporation 

2. XFER/A STTI A) 



LIS^R) 



(CTRL-Z was pressed 
here.) 



XFER/A STTI B) 

T) 

CTRL-Z 

R 

(Try again to execute the indirects.) 

@A®gB«) 
MYFILE 128 D 
ALPHA.SV 400 D 



Without a delimiter after "LIS" the indirects produce 
"LIST". The CLI will accept literally every character 
you build into an indirect or macro file. 



CLI - System Interface 

The CLI is a system utility of the operating system, and 
communicates with it through standard system calls 
and reserved system calls. Whenever you type in a 
command that will execute a program (your own or a 
system utility) the CLI creates a file called COM.CM to 
communicate with the program. The CLI then takes 
your command line, formats it, and places it in 
COM.CM. The command remains in COM.CM until 
you type another program-executing command; then 
the new command replaces the old in COM.CM. For 
example, if you type the command: 

MAC/N MYFILE) 

The CLI formats the command, including the switch, 
and places it in CO.M.C.M. Then, through system calls, 

the CLI brings MAC (the macroassembler program) 
into execution; MAC searches COM.CM for a 
filename, finds MYFILE, and assembles it. This 
activity is invisible to you at the console, but you must 
understand it if you want to pass arguments to your 
own program.s from the CLI, as described in Appendix 
D. 



Dual Programming (RDOS Only) 

RDOS permits you to divide memory into two portions 
- called a foreground and a background. Within each 
ground, you can execute a separate program which 
runs autonomously in its own ground of memory. 



3-6 



093-000109-01 



Licensed Material - Property of Data General Corporation 

The way you handle dual programming will depend on 
whether or not your computer has a hardware map. If it 
is mapped, then ii runs under mapped RDOS. The 
mapped system provides, among other things, 
hardware separation between the foreground and 
background sections of memory, and the programs that 
run in them. Mapped systems also provide the G.MEM 
command to check the memory allotment of each 
ground, and the S.MEM comm.and to change this 
allotment. 

In an unmapped system, you must place memory 
address information in programs which you want to 
e.xecute in the foreground. 

Executing Background and 
Foreground Programs 

When RDOS is . bootstrapped (started up), no 
foreground e.xisis; all memory is allocated to the 
background and the CLI is running in the background. 
To execute a program, you type programname); the 
program is then read in from disk and executed in 
background memory. 

In a mapped system, you create a foreground with 
SMEM; you can then execute a program in the 

foreground by typing the command 

EXFG programname ). 

This brings in the program and executes it in 
foreground memory. In mapped systems, you can 
EXFG any program if you have allotted enough 
memory with S.MEM; there is no functional difference 
between foreground and background programs. You 
can EXFG the CLI itself, if you have a foreground 
console to communicate with it. The example below 
shows two CLIs running. 

(In an unmapped system, you can also use EXFG to 
execute a program in the foreground; but you must 
have configured the program with foreground address 
information beforehand. The program itself, not the 
SMEM command, creates the foreground.) 

When you issue the EXFG command, there must be 
enough memory allocated to the foreground for the 
foreground program to execute. If there is not enough 
memory, you'll receive the error message: 

INSUFFICIENT MEMORY TO EXECUTE PROGRAM 



IMaGeneral 

SOFTWARE DOCUMENTATiON 

You can remedy this in a mapped system by allocating 
more memory to the foreground with S.MEM; or you 
can decide to run a smaller program in the foreground. 
In an unmapped system, you must change the 
boundary information in the foreground program 
itself; do this with the RLDR command. 

In either system, after the foreground program is 
running, the CLI prompt will return to the background 
console; you can then resume normal background 
operations. 

Normally, when you run two grounds, the system 
console communicates with the background program 
and another console with the foreground program. 
Foreground and background programs can 
communicate via system calls; each can initialize and 
use directories and devices; each can open and read 
Oles. Each program can access the same directory 
simultaneously. 

When a directory has been initialized by any ground, 
either ground can use it. If the other ground does 
initialize it, there will be no error message; the 
directory will simply have been initialized by both 
grounds. When a ground releases a directory which the 
other ground has also initialized, this message appears 
on the console: 

DIRECTORY SHARED: directoryname 

This is simply an informational message; it means that 
the directory has been released by one ground, but that 
the other is still using it. 

If you try to release the master directory while the 
other ground is running, you'll get an error message. 
For example, assume that you're running two grounds 
and your master directory is DZO. From the system 
console, you type: 

RELEASE DZO) 

FOREGROUND ALREADY RUNNING: DZO 

R 

Before you can release the master directory, you must 
terminate the foreground program. 



093-000109-01 



3-7 



Dual Programming CRDOS Only) 



DataGeneral 

SOFTWARE DOCUMENTATION 

Terminating the Foreground Program 

To termioate the foreground, type CTRL-F from the 
background. CTRL-F isn't recognized from the 
foreground console. CTRL-F releases all devices and 

directories initialized by the foreground, restores total 
control to the background, and displays the message 

FG TERM 

on the background console. It has no effect upon the 
background program in a mapped system. (In an 
unmapped system, it releases all foreground memory 
to the background.) If the foreground program has files 
open when you type CTRL-F, the updates won't 
necessarily be written to disk; thus if the updates are 
important, make sure the foreground closes al! its open 
files before you terminate it. 

You can also terminate any foreground program 
(except a text editor) by typing CTRL-A or CTRL-C 
from the foreground console. These work the same way 
as CTRL-F from the background, except that CTRL-C 
creates a breakfile called FBRE.4K.SV to save the 
foreground memory image. 

Foreground-Background Example 

This example shows a mapped RDOS system with 

I28K bytes of memory. Mapped systems allot memory 
in blocks of 2,048 bytes, thus this system has 64 block's 
of memory. In this system, RDOS requires 12 blocks, 
which means that the GMEM command returns a total 
of 52 blocks. In this system is a directory called 
.MYDIR, which contains a file called MYFILE. The 
figures show dialog on the background console (left), 
then dialog on the foreground console (right). 




Check foreground/background figures; allot 48K 
blocks to the background. 



Licensed Material - Property of Data General Corporation 










■ Av ?■■?••*■ 

-.■■t8.*ifef.4.^P,tU 



fm 



Execute the CLI in the foreground; receive an error 
message; allocate more memory and try again. 







Initialize MYDIR in the background, then the 
foreground. 




Edit MYFILE in the background with the text editor; 
change "CAT" to ''DOG", then close MYFILE so 
that you can edit it in the foreground (you can't edit it 
from both grounds simultaneously). Change "DOG" 
to "HAWK'" from the foreground. 




Try to delete file which is still open in the foreground. 
You can't delete it. Now, close file in foreground and 
return to foreeround CLI. 



3-8 



093-000109-01 



Licensed Material - Property of Data General Corporation 



I^taGaieral 

SOFTWARE DOCUMENTATION 





'-' ^'i?fhYifim^iiirf^]'%T^ 



The foreground updates the file last, hence the 
foreground changes remain in MYFILE. 






Release MYDIR from the background; the message 
informs you that the foreground has also initialized it. 
Try to release the master directory (Dxx); you cannot 
because the foreground program requires it. From the 
foreground console, release MYDIR; no other ground 
is using MYDIR, thus no message returns. 





The foreground has released its directories, and closed 
its files, so terminate the foreground program (here, a 
CLI) with CTRL-F. Now, you can release the master 
direciorv. 



End of Chapter 



093-000109-01 



3-9 



Dual Programming (RDOS Only) 



Licensed Material - Property of Data General Corporation 



DataGei^al 

SOFTWARE DOCUMENTATION 



Chapter 4 
CLI Commands 



This chapter defines and describes each CLI command 
in two ways: by category and in alphabetical order. 
Table 4-1 presents commands by category; the 
remainder of the chapter describes them alphabetically. 
Unless a command is noted RDOS or DOS, it works in 
both systems. 

Within the alphabetical section, each command entry 
begins with the command name, a capsule description, 
and a command format. To interpret the format 
properly, you must understand the documentation 
conventions as described in the Preface. Except where 
noted in the text, the syntax rules explained in Chapter 
2 apply to each command format: you can substitute 
multiple spaces or a comma for a space, and you can use 
parentheses or angle brackets whenever you think they 
will save time. Italic brackets enclose optional entries, 
except'm the RLDR command. 

Generally, when a CLI command lakes a filename 
argument, that argument can include a directory 
specifier (e.g., PRINT SUBDIR:FILENAME} ). A few 
commands require the filename to be in the current 

directory; these are noted. 

The template characters (- and *) can be used only for 
the following commands: BUILD, DELETE, DUMP, 



LIST, LOAD, MOVE, and UNLINK. If you use them 
elsewhere, the CLI will return an ILLEGAL 
FILENAME error message. 

In some cases, we have used the up arrow (f) 
line-continuation convention to prevent the format 
from overrunning the column edge. You can ignore 
this break and proceed to type as much of the 
command line as will fit on a line of your console. 
However, if you type more than 132 characters on a 
line, you'll receive the message 

LINE TOO LONG 

and the entire line will be aborted. 

Table 4-1 divides the CLI commands into four 
categories: File Management, Directory, System 
Control, and System Utilities. Each entry includes the 
command name, a general format for using it, and a 
brief description of its action. 

All the commands described under "System Utilities'' 
invoke system utilities. These are programs which the 
CLI executes; they are not part of the CLI, and the CLI 
is not active when they run. When they terminate 
(either normally or after a fatal error), they return to 
the CLI. 



093- WOl 09-01 



4-1 



CLI Commands 



SOFTWARE DOCUMENTATION 



Table 4-1. 



Licensed Material - Property of Data General Corporation 
CLI Commands by Category 



File Management Commands 



APPEND groupfilename filename... 
BPUNCH filename... 
BUILD outputfilename filename ... 
CCONT filename blockct 
CHATR filename f+Jf-Ianribs 
CHLAT filename /-r/Z-Zattribs 
CLEAR iJHenamel 
GRAND filename 
CREATE filename 

DUMP dumpfilename (filename.. J 
ENDLOG [password! 
FILCOMfilenamel filename2 
FPRINT filename 

LINK linkname resfilename 

LIST filename 

LOAD dumpfilename [filename...] 

LOG [password] 

MKABS savefilename binaryname 

MKSAVE binaryname savefilename 

MOVE dkectory [filename...] 

PRINT filename... 

PUNCH filename... 

RENAME oldname newname 

REV filename 

SAVE filename 
TYPE filename 
XFER soyrcefile destinationfile 



Description 



Combine two or more files. 

Punch a binary file. 

Build a file from filenames. 

Create a contiguous file. 

Change a file's attributes. 

Change a file's link access attributes. 

Set file use count to zero. 

Create a random file. 

Create a sequential file (in DOS, a 
random file). 

Dump a file in CLI DUMP format. 

Close the LOG file. 

Compare the contents of two files. 

Print a file in octal, or other specified 
format. 

Create a link entry to a resfilename. 

List the statistics of a file. 

Load DUMPed files. 

Start recording in the log file. 

Make an absolute file from a save file. 

Make a save file from an absolute file. 

Copy a file to any directory. 

Print a file on the line printer. 

Punch an ASCII file. 

Rename a file. 

Display the revision level of program 
filename. 

Rename a breakfile. 

Type a file on the console. 

Copy the contents of one file to another 
file. 



4-2 



093-000109-01 



Licensed Material - Property of Data General Corporation 

Table 4-1. CLI Commands by Category (continued) 



SOFTWARE DOCUMENTATION 



Directory Commands 



CDIR directoryname 

COPYdiskettel diskette2 
CPART partname blockct 
DIR directoryname 
DtSK 

DUMP outputfilename 

EQUIV newname oldname 

fDUMPfMTnJ 

FLOAD i.MTnJ 

GDIR 

INIT directory or tapedrive 

LDIR 

LOAD dumpfilename 

LIST l/lleriamel 

MDIR 

MOVE directory (/Rename.. J 

RELEASE directory or tapedrive 



System Control Commands 



filename /.S 1-7 
BOOT disk or system 
CHAIN filename 

CLEAR l/Ue name J 
DISK 

ENDLOG [password] 



Description 



Create an RDOS subdirectory or DOS 
directory. 

Copydiskeuel to disketie2 (DOS). 

Creare a secondary partition (RDOS). 

Change the current directory. 

Display the number of blocks used and 
remaining on the current partition or DOS 

diskette. 

Copy the contents of the current directory 
to outputfilename. 

Temporarily rename a disk or mag tape 
specifier (RDOS). 

Fast dump the current directory to mag 
tape (RDOS). 

Fast load a fast dumped (FDUMPed) file 
into the current directory (RDOS). 

Display the current directory name. 

Initialize a directory or tape drive. 

Display the last current directory name. 

Reload DUMPed files. 

List file information 

Display the master directory name. 

Copy files to any directory. 

Release a directory or tape drive. 



Description 



E.xecute filename. 

Bootstrap a system from disk. 

Overwrite the CLI with an executable 
program. 

Set file or device use count to zero. 

Display the number of disk blocks used 
and remaining. 

Stop recording in the log file. 



093-000109-01 



4-3 



CLI Commands 



IMaGoiaBl 

SOFTWARE DOCUMENTATION 



Table 4-1. CLI 



Licensed Material - Property of Data General Corporation 
Commands by Category (continued) 



System Control Commands 



EXFG program 
GMEM 

GSYS 

GTOD 

FGND 

INIT directory or tapedrive 

LOG fpasswordj 

MCABOOT (see command) 

MESSAGE text 
POP 

RELEASE directory or tapedrive 
SDAY mmddyy 
SMEM background 

SPDIS devicename ... 

SPEBL devicename ... 
SPKILL devicename ... 

SJOD fhhilmmjfssj 

TPRINT 

TUOFF 

TUON 



System Utilities Commands 



ALGOL filename... 
ASy filename ... 

BASIC 



Description 



E.xecute program in the foreground 

(RDOS). 

Display background/foreground memory 
areas (mapped RDOS). 

Display the current system name. 

Display the current system time. 

Describe the foreground program status. 

Initialize a disk directory or tape drive. 

Start recording in the log file. 

Transmit a system over an MCA line 
(RDOS). 

Display a text message. 

Return to the program on the next higher 
level. 

Release a directory or tape drive. 

Set the system calendar. 

Set the background/foreground memory 
areas (mapped RDOS). 

Disable spooling to devicename. (RDOS) 

Enable spooling to devicename. (RDOS). 

Delete data spooled to devicename 
(RDOS) 

Set the system clock. 

Print the tuning file (RDOS). 

Stop recording in the tuning file (RDOS). 

Start recording in the tuning file (RDOS). 



Description 



Compile an ALGOL source file (RDOS). 

Assemble a source file, producing an .RB 
file. 

Invoke the BASIC interpreter. 



4-4 



093-000109-01 



Licensed Material - Property of Oala General 

Table 4-1. 



Corporation 

CLI Commands by Category (concluded) 



I^taGeieral 

SOFTWARE DOCUMENTATION 



System Utilities Commands 



BATCH [jobfile...J 

CLG filename... 

DEB savefilename 
EDIT [filenamel 
ENPAl [fikmamel 

FDUMP f.UTnl 

FLOAO [XfTnl 

FORT filename ... 

FORTRAN filename... 

LFE (see command) 
MAC filename... 

MEDIT terminals ///cA-s/ 

NSPEED [filename] 
OEDIT filename 

OVLDR (see command) 

PATCH (see command) 
RDOSSORT (see command) 

REPLACE savefilename 

RLDR (see command) 

SEDIT filename 

SPEED (filename] 

SYSGEN (see command) 
VFU filename 



Description 



Invoke the Batch monitor, toe.xecute 
Batch job streams (RDOS). 

Compile, load, and execute a FORTRAN 
IV source file. 

Debug a program. 

Invoke the Text Editor. 

Insert patch (es) in filename; also see 
PATCH. 

Fast dump the current directory to 
magnetic tape (RDOS). 

Fast load a fast-dumped (FDUMPed) file 
into the current directory (RDOS). 

Compile a FORTRAN IV source 
program. 

Compile a FORTRAN 5 source program 
(RDOS). 

Create or edit RB Library Files. 

Assemble a source file into a relocatable 
binary (RB) file with the Macroassembler. 

Invoke the Multiuser Text Editor 
(RDOS). 

Edit text with the NOVA Supereditor. 

Edit disk file locations with the Octal 

Editor. 

Create an overlay replacement file. 

Install patch (es) created by ENPAT. 

Sort a file or merge files with the 
Sort/Merge program (RDOS). 

Replace overlays in an overlay file 
(RDOS). 

Process relocatable binary files to form an 
executable program. 

Edit disk file locations with the Symbolic 
Editor. 

Edit text with the ECLIPSE Supereditor 
(RDOS). 

Generate a new operating system. 

Create or load a VFU file for a data 
channel line printer (RDOS). 



093-000109-01 



4-5 



CLI Commands 



SOFTWARE DOCUMENTATION 

filename 

Execute the program or macro named 
filename 



Format: 

filename [.SV] [argumeMi ... argument^ J 

This command directs the CLI to find and execute the 
file named filename. The CLI searches first for a macro 
file (filename.MC). then for the save file {filename.SV). 
If it cannot find either, it returns the error message: 

FILE DOES NOT EXIST: filename.SV 

If you have both an .SV and .MC version of a file in the 
same directory, you can force the CLI to search for the 
save file by including the .SV e.xtension. 

The CLI will ignore arguments and switches if the 
filename has the .MC extension, and is therefore a 
macro file. If filename is a save file, it can access global 
switches, arguments, and local switches in CLI file 
COM. CM, as described in Appendix D. 

Switches: 

User-definable 

Examples: 

DP1:MYFILE} 

Execute MYFILE in directory DPI. MYFILE could be a 

macro file (extension .MC), or a save file with the .SV 

extension. 

MYFILE.SV) 

Execute MYFILE in the current directory. 

DPO:EDIT} 

Execute the text editor program in DPO. 



Licensed Material - Property of Data General Corporation 

ALGOL 

Compile an ALGOL source file (RDOS) 

Format: 

ALGOL filename... 

Compile and assemble a program written in ALGOL. 
As output, you can specify an assembled binary file, an 
intermediate source file, a listing file, or combinations 
of all three. The command will not work if its name. 
ALGOL, is changed. 

On input the CLI searches for filename. AL; if it does not 
find this, it searches for filename. 

If you omit switches from the command line, ALGOL 
produces an intermediate source file, filename.SR 
(compiler output), and a relocatable binary file 
filename. RB (assembler output). After a successful 

assembly, the intermediate source file is deleted; no 
listing is produced. 



For more detail, see 
Manual. 

Global Switches: 



the Extended ALGOL User's 



/A 
/B 

/E 

/L 
/N 

/S 

/u 



Do not assemble the compiled file. 

Brief listing (ALGOL input to the 
compiler only). 

Suppress console error messages from 
the compiler. (Assembler error 
messages are not suppressed.) 

Produce listing file (filename.LS). 

Check with assembler, but do not 
produce a binary file (useful for finding 
errors). 

Save the intermediate source file, under 
filename.SR. 

Append user symbols to binary output 
file. 



4-6 



093-000109-01 



Licensed Material - Property of Data General Corporation 
Local Switches: 



Name the binary output file name 
(overrides global /N). 

send error listing to file name. 

Send listing output to file name 

(overrides global /L). 

Send the intermediate source file to file 
name. 



name/B 

name/E 
name/L 

name/S 

Examples: 

ALGOL MAIN) 

Compile and assemble file MAIN, producing a binary 

file, without a listing. 

ALGOL/A/LRAY) 

Compile (but do not assemble) file RAY.AL or RAY; 
write the intermediate source file to disk file RAY.Sr! 
ALGOL source listing goes to disk file RAY.LS. 

ALGOL/E/B SUBR SLPT/L) 

Produce binary file SUBR with a brief ALGOL source 

listing to the line printer; suppress compiler error 

messages. 



DataCjeneral 

SOFTWARE DOCUMENTATION 

APPEND 

Copy one or more files under a new 
name 



Format: 

APPEND groupfilenamefilenamei [...filename^] 

Create groypfilename and copy the contents of 
filenames into it. The old files are not changed. You can 
use directory specifiers for groupfilename or any 

filename. 

Switches: 

None. 

Examples: 

APPEND TAPEFILESMTOn MT0:2} 

Create TAPEFILES. and copy the contents of tape files 1 
and 2 (from drive MTO ) into it. 

APPEND PTRFILES $PTR/3} 
LOAD SPTR, STRIKE ANY KEY 

Create disk file SPTRFILES, and prom.pt for three tapes 
to be loaded into the paper tape reader; copv tapes to 
SPTRFILES. 



093-000109-01 



4-7 



APPEND 



DataGeneral 

SOFTWARE DOCUMENTATION 

ASM 

Assemble source files to produce a 
relocatable binary (RB) file 



Format: 

ASM filenamei f...Jllename„J 

Assemble one or more source files with ihe Extended 
Assembler. This produces a relocatable binary file 
(RB), which you then process with the RLDR 
command. 

If you omit switches, ASM produces a relocatable 
binary file named filename.RB, and no listing. For 
more detail, consult the Extended Assembler User's 
Manual. 

Global Switches: 



/E 



/L 



m 



/S 



/T 



/U 



/x 



Suppress error messages to the console 
(unless there is no listing file). 

Create disk file filename. LSi and send 
listing to it; or append listing if file 

already exists. 

Do not build a relocatable binary file 
(useful for finding assembly errors). 

Skip pass two, and store the assembler's 
symbol table in file BREAK.SV. The 

console displays BREAK. You can then 
rename BRE.AK.SV (with the S.AVE 
command) to store this symbol table 
which contains your own semipermanent 
symbols. 

Do not include symbols in the 
cross-reference listing (used with global 

/X). 

Include user symbols in the relocatable 
binary file. 

Produce symbol/page cross-reference 
listing. .Assembler file XREF.SV must be 
available on disk. 



Licensed Material - Property of Data General Corporation 
Local Switches: \ 



name/B 

name/E 
name/L 

name/N 

name/S 



Give relocatable binary this name instead 

of filename.RBt (overrides global /N). 

Send error messages to file name. 

Send listing to file name (overrides 
global /L). 

Do not include assembly listing of file 
name (used with global or local /L). 

Skip file name on pass two of assembly. 
Use this switch only if file name does not 
contain any storage words. 



Extensions: 

The CLI searches for filename.SR; if it doesn't find 
that, It searches for filename. It names the relocatable 
bmary file filename.RB,. and filename.LS, (global /L), 
unless the command included the /B, /L, or /S local 

suitch. 



Error Codes: 

If a line of source code contains an error, the assembler 
places a letter at the lefi margin of the offending line in 
the listing. Ii can insert no more than three codes per 
line. 



Code 



A 

B 
C 

D 

E 

F 

G 

I 

K 

L 

M 

N 

O 

P 

Q 

R 

S 

T 

U 

X 

2 



Meaning 



.Addressing error. 

Bad character. 
Colon error. 
Radix error. 

Equivalence error. 

Forma! error. 

Global symbol error. 

Parity error (input). 

Conditional assembly error. 

Location counter error. 

.\iuliipiy-defined symbol error. 

Number error. 

Field overflow error. 

Phase error. 

Questionable line error. 

Relocation error. 

Symbol table overflow error. 

Symbol table pseudo-op error. 

Undefined symbol error. 

Text error. 

Expression has illegal operand. 



4-8 



093-000109-01 



Licensed Material - Property of Data General Corporatiort 
Examples: 

ASM/NFILEI) 

Assemble source file F!LE1 . and send error messages to 
ihe console: do not produce a relocatable binary or 
listing file. This checks for errors, which you 'can 
correct before an RB and listing file is produced'. 

ASM MYFILE SPTP/B SLPT/L) 

Assemble MYFILE from disk; punch the relocatable 
binary on the paper tape punch; send listing to the first 

line printer. 

ASM/L (A.B.C. DP4:D)} 

Assemble as separate files A. B, C, and D in DP4. 
Produce A.RB. B.RB. C.RB. and D.RB, and listing files 
A.LS. B.LS C.LS, and D.LS; place all output in the 
current directory. See Chapter 3 for an explanation of 
parentheses. 

ASM/L PARU/SPR0G1 PR0G2} 

Assemble PR0G1 and PR0G2, producing PROGI.RB; 
scan the user parameter file PARU.SR on pass one to 
find values for symbols in PR0G1 and PR0G2. Send 

the listing to PROGI.LS 



DataGeneral 

SOFTWARE DOCUMENTATION 



BASIC 

Invoke the BASIC interpreter 

Format: 

BASIC) 

Invoke the BASIC interpreter, which allows vou to 
work in the BASIC language. A BASIC save file, 
configured via BASIC System Generation (BSG), must 
exist before the system can execute this command. 
BASIC SYSGEN procedures are described in the 
Extended BASIC System Manager s Guide. 

Switches: 

None 

Example: 

R 
BASIC) 



BYE) 
R 



BASIC Commands 
(Return to CLI) 



093-000109-01 



4-9 



BASIC 



EMaGoieral 

SOFTWARE DOCUMENTATION 

BATCH 

Execute a BATCH job stream (RDOS) 



Format: 

BATCH [jobfiki ...jobfikn J [omfileiO] [logfileiG] 

Invoke the BATCH monitor, which can process one or 
more serial job streams without operator intervention. 
Each job stream consists of one or more job! iles. which 
are input via a device or disk file. Each user job in 
jobfile must contain certain job control commands; it 
may also contain data sets and reference devices. Many 
CLI commands and RDOS utilities are available under 
BATCH. 

If you omit switches, the line printer is the output file 
(called SYSOUT), the card reader is the input file, and 
the console is the log file. When you enter the BATCH 
command, the BATCH monitor searches for jobfile.JB; 
if not found, a search is made for jobfile. Consult the' 
BA TCH User's Manual foT more information. 

Global Switches: 

None 

Local Switches: 

name/0 Send output to file name; default (line 

printer) name is SYSOUT. 

name/G File name is the log file. 

Example: 

R 

BATCH DAILY. JBMT0:1 LOG/G) 

> B.4TCH Commands 

EOF) 

BA TCH TERMISA TED 8/1 9/77 10:48:05 
R 

The command line defines a job stream with jobs 
serially input via two files: the first is disk file DAILY.JB. 
and the second is file 1 of MTO. Job log information 
goes to a disk file named LOG, and theline printer is 
SYSOUT by default. 



Licensed Material - Property of Data General Corporation 

BOOT 

Execute a different operating system or 



stand-alone program 



Format 

BOOT 



(disk 

( [directory:] sysname 



Release the current system and bootstrap svstem or 
program sysname into execution. The disk bootstrap 
program, BOOTSV. must reside in the primary 
partition of the disk which holds sysname. All 
directories involved must be initialized. The disk must 
be one of the directories named in Table 2-2 (RDOS) 
or Table 2-3 (DOS). The directory: specifier cannot 
mclude an RDOS subdirectory or DOS directory. 

The sysname can be the name of an operating system 
or a properly-built stand-alone program (see below). It 
can also be the name of a link entry to a svstem, if both 
the system's save and overlay files are linked. If 
sysname is a link, all intermediate directories must be 
miiialized. In every case, when the bootstrap succeeds, 
the directory containing sysname becomes the master 
directory. 

If you omit a sysname (first form), BOOT will ask for 
one when it gains control. You then enter the system or 
program name (or simply RETURN to bootstrap a 
system with the default name, SYS.SV). You must use 
this form of the BOOT command to execute certain 
stand-alone programs. 



Stand-alone Programs 

A_ stand-alone program is a program which runs 
without an operating system. You can execute a 
stand-alone program directly via the BOOT command if 
it conforms to the following rules: 

1. The save file must be randomly organized. 
Normally, it will be, but transferring it with the 
XFER command can change its organization. 

2. It must begin at location 0. Location must contain 
either or a byie pointer lo a text siring (the 
program name). If it contains the latter, ih"e text 
string will be displayed on the console. 



4-10 



093-000109-01 



Licensed Material - Property of Data General Corporation 

3. Location 2 must contain either ihe save fiie starting 
address or - 1 . If it contains the starling address, the 
program will self-start: if -1. the computer will halt 
after the load (press CONTINUE to continue). 

4. Location 5 must contain 0. 

See RLDR global /C or /Z switch for loading 
information. 

To bootstrap a program which does not follow these 
rules, execute a MKSAVE/Z command on it; then 
BOOT the directory which contains it. When BOOT 
asks FILESAXfE^iypQ the program name, and append 
the /A switch. BOOT v%-ill load the program; you must 
then execute it via the front pane! switches. 

Restart Feature 

If the data switches are all up when you type BOOT, 
BOOT will try to bootstrap the system specified. If you 
omit the sysname. it will try to bootstrap the default 
system name. SYS.SV. When it finds and bootstraps a 
system, it then attempts to chain to a file named 
REST.ART.SV. This mechanism is part of a real-time 
process control restart feature, described under the 
.BOOT call in your system reference manual. If you 
don't want it, make sure the data switches aren't all up 
when you type BOOT. 

For a microNOVA: see .BOOT command in your 
system reference manual for restart features. 



DataGeneral 

SOFTWARE DOCUMENTATION 



Examples: 

B00TDP4} 

MASTER DEVICE RELEASED 

FILENAME'? MYSYS) 

Load BOOT.SV from DP4. release the master directory. 
ask for a sysname, gel answer (MYSYS). then bootstrap 
(MYSYS). then bootstrap MYSYS in DP4. MYSYS 
requests the date and time, then activates its CLI. 

BOOTDP0F;SYS64K} 

Bootstrap the svstem named SYS64K in direciorv 
DPOF. 

BOOTDP0:RTOS} 

Bootstrap the RTOS system save file in directory DPO. 

BOOT DPI) 

MASTER DEVICE R EL EASED 

FILENAME? FOO.SV/A) 

Invoke BOOT and execute the absolute program 
FOO.SV. FOO.SV does not conform to BOOl 
conventions, thus the /A switch. 



Local Switch; 



/A 



(In response to the FILENAME? query). 
This is a stand-alone program, which 
does not conform to BOOT conventions. 



093-000109-01 



4-11 



BOOT 



DataGeneral 

SOFTWARE DOCUMENTATION 

BPUNCH 

Punch a file in binary 



Licensed Material - Property of Data General Corporation 

BUILD 

Build a file from filenames 



^. 



Format: 

BPUNCH filename, Ifilenamej ...] 

Punch a given file or files in binary on the high speed 
punch. To punch an ASCII file, use PUNCH. The 
command is the eqivalent of the XFER command: 

XFER filenameCs) SPTP) 

The files may come from any device. 

Switches: 

None. 

Examples: 

BPUNCH FEE.SR FI.SR FO.RB FUM.RB) 

Punch source files FEE and Fl, and relocatable binary 
files FO and FUM on the high speed punch. 

BPUNCH SPTR) 

Punch a paper tape duplicate of the tape in the 
high-speed reader. 



Format: 

BUILD outputfilename [filenamei ..J 

Build an output file from filenames in the current 
directory. You can use template characters and date 
switches to select filenames. The BUILD command 
deletes outputfilename (if it exists) before creating the 
new output file. 

Global Switches: 

/A Include all filenames which have 

permanent and nonpermanent 

attributes. (By default, only 
nonpermanent files will be built into 
outputfilename). 



/K 

m 



Do not include link entries. 

Do not include extensions to filenames 
when they are built into outputfilename. 



Local Switches: 

mm-dd-yy/A Include only the names of files created 
this date or after. Arguments mm 
(month) and dd (day) can be one or two 
digits. 

mm-dd-yy/B Include only the names of files created 
before this date. 

name/N Do not include names that match name 

in this outputfile. 

Template Characters: 

Permitted 



4-12 



093-000109-01 



Licensed Material - Property of Data General Corporation 

Examples: 

BUILD ABC -.SR TEST-.) 

Create file ABC. and wriie iwo categories of files into it: 
those whose names have the .SR extension, and those 
whose names begin with TEST and have no extension. 

BUILD MYFILE -.RB ABC.RB/N) 

Create MYFILE. and insert all RBs except ABC into it. 

BUILD RECENT -.SR 8-8-77/A) 

Build file RECENT, from all files with a .SR extension 
created on or after August 8, 1977. 

BUILD OUTPUT -TEXT) 

R 

PRINT eOUTPUT®} 



I^taGoieral 

SOFTWARE DOCUMENTATION 

CCONT 

Create a contiguous file 

Format: 

CCONT filename, blocks i [t'llename, blocks /... 

Create one or more contiguous files with all data words 
zeroed. Each file has the C characteristic, no attributes 
andjhe fixed length in blocks you specify. A disk block 
is 2^6 words long. For details on contiguous files, see 
Chapter 2 of your system reference manual. 

Global Switches: 



m 



Do not zero data words in the new file. 

By default, the system zeroes each data 
word. 



This sequences produces OUTPUT which contains all 
filenames whose last four characters are TEXT and have 
no extension; it then prints these files. 



Examples: 

CCONT ALPHA 20} 

Create the contiguous file, ALPHA, in the current 
directory, with a length of 20 disk blocks. 

CCONT TEST 1 00 DPI :TEST1 51 } 

Create two files, TEST in the current directory and 
TEST1 on disk DPI. 



093-000109-01 



4-13 



CCONT 



SOFTWARE DCXrUMENTATION 

CDIR 

Create a subdirectory (RDOS) or 
directory (DOS) 



Format: 

CDIR (sub)directoryname 

Create a (sub)directory with the .DR extension in the 
current directory. If the current directory is a 
subdirectory, you'll receive an error message. Each 
(sub)directory acts as a pointer to files createdin it and 
has a fi.xed size of 5 1 2 bytes. 

To prevent confusion, we recommend that you give 
each (sub)direciory a unique name. 

Switches: 

None. 

Example: 

CDIR DPI :BETH) 

Create (sub)directory BETH.DR in DPI. Equivalent 
commands would be: 

DIRDPI) 
CDIR BETH) 



Licensed Material - Property of Data General Corporation 

CHAIN 

Overwrite the CLI with another program 

Format: 

CHAIN savefilename) 

Overwrite the CLI by chaining savefilename into 
execution on the current level. Under RDOS, use 
CHAIN only in special circumstances and with caution. 
The savefilename should chain control back to the CLI 
via system call .EXEC (see Chapter 4 of your svstem 
reference manual). 

In RDOS, the program which you chain issues a .RTN 
instruction from level zero in the background, the 
system will hall in exceptional status; also, CTRL-A 
and CTRL-C may cause exceptional status. 

Note that you cannot CHAIN when the log file is open 
in the current ground; this file must be closed 
(ENDLOG) first. 

Global Switch: 

/D Pass control to the debugger. 

Local Switches: 

None. 



Example: 

CHAIN is useful when you have a program which 
needs to use five swap levels (when you execute a 
program from the level CLI, it runs on level I, hence 
has only levels 2, 3 and 4 available). 

In DOS only, CHAIN can speed up utility program 
commands (e.g., CHAIN ASM MYFILE) ). 



4-14 



093-000109-01 



Licensed Material - Property of Data General Corporation 

CHATR 

Change a file's attributes 



Format: 



CHATR filenamei { ^ } attribi | 
[...filename^ |_ \ ..aiiribs^ J 



Add or remove file access attributes (attribs) to a file. 
To add an attribute, precede it with a plus sign ( + ); to 
remove an attribute, precede it with a minus (-) sign; to 
remove all attributes, enter as an argument. Enter 
multiple aitnbs as a single argument. You can deny 
execute ^cctss to a save file by removing its S attribute; 
while it lacks S, no one can execute it. 

DOS users: When you copy any file from a 
wriie-protected diskette via MOVE or DUMP, the copy 
receives attributes PW and characteristic A, which 

means that you cannot alter or delete the copy. 



Attributes: 

N 



W 



Do not allow linking to this file (actually, 
the link can be created, but not used). 

Make this a permanent file. A file cannot 
be deleted or renamed while it has this 
attribute. Note that none of the 
following commands recognize a 
Permanent file (unless you include local 
/A): BUILD, DUMP, LIST, LOAD, 
MOVE. 

Read-lock this file. No one can read this 
file (or copy it via DUMP, FDUMP, 
MOVE, or XFER) while it has the R 

attribute. 

Designate this a save file. RLDR assigns 

this when it processes binaries into a 
save file. If you remove it, a save file 
cannot execute. 

Write-lock this file. No one can modify 
this file while it has the W attribute. (It 
can, however, be deleted.) 

Remove all removable attributes (except 
S). 

Retain all existing attributes. 

User-defined attribute. 

User-defined atribute. 



SOFTWARE DOCUMENTATION 



File Characteristics 

(CHATR cannot change these): 



C 

D 
T 
Y 



This is an attribute-protected file. You 
can set A with system call .CH.ATR. 
Once set, A cannot be removed. 

This is a contiguous file. 

This is a random file. 

This file is a partition (RDOS). 

This file is an RDOS subdirectory or 
DOS directory. 



Examples: 

CHATR YOURFILE MYFILE R) 

Remove all attributes of YOURFILE and read-lock 
MYFILE. 

CHATR MYFILE -R-fW) 

Re-enable MYFILE for reading, but prevent it from 
being modified. 

CHATR PASSWORDS R) 
CHATR PASSWORDS +R} 
CHATR PASSWORDS 'R) 
CHATR PASSWORDS -R) 

The first command removes all attributes from 
PASSWORDS, then assigns the R attribute. The second 
and third commands have the same effect; each adds 
the R attribute to existing PASSWORDS attributes. The 
fourth command removes the R attribute. 



093-000109-01 



4-15 



CHATR 



I^taGeieral 

SOFTWARE DOCUMENTATION 

CHLAT 

Change a file's link access attributes 



Format: 

CHLAT filenamei { ^ } attribi | 
[...filename„ |^ \ ...auribs„] 



Add or remove link access attributes (amibs) to a 
resolution file. This controls the type of operation link 
users can perform on this file from other directories. To 
add an attribute, precede it with a plus sign (+); to 
remove an attribute, precede it with a minus (-) sign; to 
remove all attributes, enter as an argument. Enter 
multiple attributes as a single argument. 



Attributes: 

N 



W 



Do not allow linking to this file (actually, 
the link can be created, but not used). 

Make this a permanent file. Link users 
cannot delete or rename a file while it 
has this attribute. 

Read-lock this file. Link users cannot 
read this file (but can execute it) while it 
has the R attribute. 

Designate this as a save file. RLDR 
assigns this when it processes binaries 
into a save file. 

Wriie-lock this file. Link users cannot 
modify this file while it has the W 
attribute. (They can, however, delete it 
ifthey DELETE the link). 

Remove all removable attributes (except 
S). 

Retain all existing attributes. 

User-defined attribute. 

User-defined attribute. 



Licensed Material - Property of Data General Corporation 
Examples: 

CHLAT YOURFILE MYFILE RW) 

Allow link users of YOURFILE to do anything; prevent 
link users from reading or modifying MYFILE. 

DIRDPO:MYDIR) 

R 

LINK PASSWORDS/2) 

R 

This creates a link in MYDIR to file PASSWORDS in 
DPO. To continue this example, assume that 
PASSWORDS has no /7/e access attributes, which means 
that anyone in DPO can read it, modify it, delete it, etc. 

DIRDPO) 
R 

CHLAT PASSWORDS R) 

R 

TYPE MYDIR:PASSWORDS) 

FILE READ PROTECTED: MYDIR: PASSWORDS 
.R 

TYPE PASSWORDS) 



PASSWORDS is read-locked to a link user only; 
because it has no CHATR read-lock, it can be read 

directly. 



4-16 



§93-000109-01 



Licensed Material - Property of Data General Corporation 

CLEAR 

Set file use count to zero 



I^teGoieral 

SOFTWARE DOCUMENTATION 



Examples: 

CLEAR/A/V/D) 



Format: 

CLEAR Ifikrmmei .../ 

Clear ihe file use count in one or more SYS.DR entries. 
Each file's use count is 1 or more %vhen the file is open: 
it should be when the file is closed. If a system fails 
when a Ole is open, its use count will remain nonzero 
when the system is rebooistrapped, and you will be 
unable to delete or rename the file. (You can check use 
counts with the LlST/U or LIST/E commands.) 



Clear use count of all files and devices in the current 
directory (except those mentioned under /A, above). 

CLEAR/VDP4;TEMP} 
CLEARED DP4:TEMP 
R 

Clear use count of file TEMP, in directory DP4. 



If an abnormal RDOS shutdown occurs, you'll receive 

the message PARTITION IN USE -- TYPE C TO 
CONTINUE when you next bring up the system. Type 
C, log on, then type CLEAR/A/V/D from the master 
directory and all other directories that were initialized 
at the abnorm.al shutdown. You'll also receive the 
PARTITION message if someone shut off power to the 
computer or master directory drive before 
RELEASEing the master directory. Again, CLEAR all 
directories that were initialized when power was turned 
off. 

A DOS system gives no PARTITION message, but you 
should follow the same CLEAR procedure as for 
RDOS. 

CLEAR works only from background level (CLI 
level) when no foreground program is running 
(RDOS). 



Global Switches: 



/A 



/D 
/V 



Clear use count in all files in the current 
directory (except the current CLI.OL, 
CLLER, sysname.OL, sysname.TU, and 
LOG. CM). To clear these files, enter 
their names as arguments to CLEAR. 
(Arguments are ignored when you use 
this switch.) 

Clear device entries also (RDOS), 

Verify filenames cleared on the console. 



Local Switches: 
None. 



093-000109-01 



4-17 



CLEAR 



DataGeneral 

SOFTWARE DOCUMENTATION 



CLG 



Compile, load and execute a FORTRAN 
IV program 



Format: 

CLG filenamei [...filename^ ] 

The CLG command can compile files usin? 
FORTRAN IV, assemble them with the Extended 
Assembler. load them with the Relocatable Loader, 
and execute the final save file. The FORTRAN 
compilation and assembly steps are optional. In the 
argument h"si, you can include FORTRAN IV source 
files (filename. FR) files in assembly language 
(filename. SR) or assembled binary files (jllename.RB). 
Output includes one or more temporary source files, 
one or more binary files, and the save file'. 

For this command to execute, the following files must 
be in the current directory (or available via links)- 
CLG.SV, FORT.SV, FIV.SV, ASM.SV, RLDR SV 
RLDR.OL, SYS.LB, and FORT.LB. You can produce 
FORT.LB by merging your four original FORTRAN 
libraries under this name, with the LFE M command. 
For further details on FORTRAN IV, see the 
FORTRAN IV User's Manual and the FORTRAN IV 
Runtime Library User s Manual. 

Unless you restrict output with global switches, all 
compilations, assemblies, and the load map will go to 
the listing file you specify with the /L switch. 

In addition to the local switches below, you can append 
RLDR local switches to each binary name. You can 
create overlays with CLG as you can in the RLDR 
command line, by enclosing them in brackets. 

Global Switches: 

/B List only the source (input) program. 

^E Suppress compiler error messages. 

Assembler error messages are not 

suppressed. 



/M 
/T 



Suppress load map (symbol table). 

This is a multitask program. (The 
multitask FORTRAN library, FMT.LB, 
must be available on disk.) 



Licensed Material - Property of Data General Corporation 
Local Switches: 



Assemble and load this file; do not 
compile. 

Direct error messages to this filename. 

Direct listing output to this filename. 

Execute RLDR phase only on this file; 
do not compile or assemble it. 



name/A 

name/E 
name/L 
name/0 

Extensions: 

On input, search for filename.FR; if not found, search 
for filename. If /A is specified, search for filename.SR; 
if not found, search for filename. If /O is specified." 
search for filename.RB; if not found, search for 
filename. 

On output, produce temporary assembler source files, 
filename.SR. Produce binary files, filename.RB i. 
Produce save file filename.SV, (unless local /S was 

included in the command line). 

Examples: 

CLG ABC) 

Compile A.FR (or A ), producing A.SR; assemble A.SR 
into A.RB and delete A.SR. Do the same with B.SR (or 
B ) and C.SR (or C ). Load A.RB. B.RB, C.RB and 
FORT.LB to produce A.SV. Execute A.SV. 

CLG/B MAIN SLPT/L) 

Compile MAIN.FR (or MAIN), list MAIN.FR on the line 
printer, and produce MAIN.SR. Assemble MAIN.SR into 
MAIN.RB and delete MAIN.SR. Process binary MAIN and 
the FORTRAN IV library producing MAIN.SV. Execute 
MAIN.SV. 

CLG/T MAIN FB/0 SR/A SLPT/L) 

Here, program MAIN is a file in FORTRAN IV, FB is an 

assembled binary, and SR is in assembly language. The 
/T switch specifies multitask mode; for multiask 
compilation FMT.LB is called from disk. 

The command processes all files as appropriate, 
producing MAIN.SV; then it executes MAIN.SV. It also 
lists all compiler, assembler, and loader output on the 
line printer. 



4-18 



093-000109-01 



Licensed Material - Property of Data General Corporation 

COPY 

Copy one diskette to another diskette 
(DOS) 



Format: 

COPY sourcediskette destinationdiskette 

Copy all files and directories from one diskeile to 
another. Before you issue this command, 
sourcediskette must be initialized and 
destinationdiskette must NOT be initialized. All files in 
destinationdiskette will be destroyed, and the files from 
sourcediskette will be moved to it, along with all file 
directory information. If destinationdiskette is not a 
Data General diskette, you must formal it with the 
appropriate formatter program and run DOSINIT.SV 
before copying to it. 

Because the root portion of BOOT.SV (blocks and 1) 
is not part of the file structure, it will not be copied. If 
you will want to bootstrap from a destinationdiskette 
which lacks a bootstrap, you must install BOOT on il. 

After the copy is complete, destinationdiskette will 
have the same system directory and directory structure 
as sourcediskette. The diskettes are virtually identical, 
therefore, both diskettes cannot be initialized at one 
lime. DOS doesn't allow two directories with the same 
name to be initialized at one lime; it will recognize only 
the first directory initialized until you release the first 
and INIT (or DIR to) the second. 



SOFTWARE DOCUMEMTATION 



Examples: 

DIR DPO) 

R 

COPY DPO DPI) 

R 



You can now remove the copy from slot DPI and store 
it. 

INITDP2;INITDP3) 

R 

COPYDP2DP3) 

DEVICE ALREADY INITIALIZED: DPS 
R 

RELEASE DP3} 
R 

COPYDP2DP3) 
R 

DOS will not copy to an initialized diskette. 

NOTE: For COPY to work, the current DOS system 
must permit at least two directories, as 
determined at SYSGEN bv your answer to the 
MAXIMUM NUMBER OF SUBDIRECTORIES 

...query. 



Global Switch: 



/L 



List copied files on the line printer. If you 
have no line printer, type LINK $LPT 
STTO) to get listings on the console. 



093-000109-01 



4-19 



COPY 



EfetaGenoBl 

SOFTWARE DOCUMENTATION 

CPART 

Create a secondary partition (RDOS) 



Licensed Material - Property of Data General Corporation 

GRAND i 

Create a random file 



Format: 

CPART partname blockcount 

Create the secondary partition named partname, with 
the length specified in blockcount The new partition 
will be a contiguous disk file and receive the extension 
.DR. 

You cannot create a partition with less than 48 disk 
blocks. If the blockcount you enter is not an integer 
multiple of 16, the system will truncate it to the next 
lower multiple. 

To prevent confusion, we recommend that you give 
each partition and subdirectory a unique name. 

Switches: 

None. 

Example: 

DIRDP2} 

CPART ALEPH 128} 
R 

The DIR command makes primary partition DP2 the 

current directory; the CPART command creates 
secondary partition ALEPH on DP2. An equivalent 
command would be CPART DP2:ALEPH 1 28}. ALEPH is 
128 disk blocks long, and logically distinct from 
primary partition DP2; you will not be able to initialize 
the subdirectories which are built (CDIR command) 
within it without its name. 



Format: 

GRAND filename 1 [fdename} ...J 

Create a randomly organized file in any directory. Each 
random file will have the D characteristic, no 
attributes, and a length of zero; it will grow as required 
during use. For details on random files, see Chapter 2 
of your system reference manual. 

Switches: 

None. 

Examples: 

CRANDRANDFILE} 

Create RANDFILE in the current directory. 

CRAND ACCUFILE DPI :VELVET:GROWTHFILE} 

Create ACCUFILE in the current directory, and 
GROWTHFILE in directory VELVET on DPI . 



4-20 



093-000109-01 



Licensed Material - Property of Data General Corporation 

CREATE 

Create a sequential file CRDOS) 



Format: 

CREATE filenamei [...filename^] 

Create one or more sequential files. Each file will have 
zero length and no ailribuies. For details on sequential 
files, see Chapter 2 of your system reference manual. 

In DOS, CREATE creates a random file. 

Switches: 

None. 

Examples: 

CREATE ALPHA) 

Create a sequential file, ALPHA, in the current 

directory. 

CREATE TEST TESTl DP1:TEST2} 

Create three filenames, TEST, and TESTl in the 
current directory and TEST2 in the primary partition on 

disk DPI. 



IMaGenoBl 

SOFTWARE DOCUMENTATION 



DEB 



Load a program into memory and go to 
the debugger 



Format: 

DEB savefilename) 

Debug a program about to be executed. A symbolic 
debugger must have been loaded as part of the program 
save file, as described under the RLDR command. The 
DEB command transfers control to the debugger in this 
save file; the debugger then outputs a carriage return 
and awaits debugging commands. 

While debugging, you can examine memory, set break 
points, and run the program. After making any 
necessary changes, you can return to the CLI by issuing 
the ESC-V Debug command; this saves the program in 
file BREAK.SV. You can then rename BREAK.SV as 
described under the SAVE command. 

Normally, you'll want to correct the source program at 
some point, then reassemble and reload it. 

Switches: 

None. 



Examples: 

DEBPGM.SV) 

START4- 15/ 00675/ 
START+15$B 

SR 



Invokes debugger, with 

file PGM.SV. 

Examine a location. 

Set breakpoint at 

START+15. 

Start the program 

executing. 



7B START+15 
0... I... 2... 3... 


Breakpoint. 


$P 




Continue debugging. 


$V 

or CTRL A 




ESC echoes as $. Create 
the break file and return to 
CLI. (Only exit from 
IDEB.) 

Return to CLI if PGM.SV 
does not have a CTRL-A 
address (or if you don't 
want ^ break file). 



093-000109-01 



4-21 



DEB 



DataGeneral 

SOFTWARE DOCUMENTATION 

DELETE 

Delete a file or directory 



Format: 

DELETE filename, [...ftlename„ ] 

Delete the files named. You may include directory 
specifiers if the directory has been iniiiahzed. If vou try 
10 delete a link, the link will persist but the resoluiionjlle 
will be deleted (attributes permitting). To remove a link 
entry, use the UNLINK command. 

To delete a (sub)directory or partition, RELEASE it 

then type DELETE directoryname.DR). 

Global Switches: 

/^ Confirm each deletion. The system 

repeats each filename, then waits for you 
to confirm the deletion by typing a 
carriage return. To prevent the deletion, 
press any key other than RETURN. 

/L List deleted files on SLPT (overrides /V). 

^^ List names of deleted files on the 

console. 



Licensed Material - Property of Data General Corporation 

Examples: 

DELETE LIMIT.- DP4:TEMP) 

Delete all files having the name LIMIT and any 
extension (including null), e.g., LIMIT.SR. LIMIT RB 
LIMIT.SV. LIMIT. Then, delete file TEMP in DP4. 

DELETE/V -.LS) 

DELETED A. LS 
DELETED COM. LS 
DELETED MARLS 

Delete all files with the .LS extension, and list their 
names. 

DELETE/CA-B) Ask for confirmation of each file 
before deletion: 



AZYB: r 
AXWB:* 



Delete file AZYB. 
Do not delete AXWB. 



When you confirm a deletion with a carriage return, the 
sysien echoes an asterisk (*). Any other character 
evokes no echo. 



Local Switches: 

mm-dd-yy/A Delete only files created this date or 
after. Arguments mm (month) and dd 
(day) can be one or two digits. 

mm-dd-yy/B Delete only files created before this date. 

name/N Do not delete any files that match this 

name. 

Template Characters: 

Permitted only when the filename is in the current 
directory. 



4-22 



093-000109-01 



Licensed Material - Property of Data General Corporation 

DIR 

Change the current directory 

Format (RDOS): 

D I R [directon-][:secondarypariiiion] [isubdirectory] 

Format (DOS): 

DIR [diskette] lidirectory] 

Change the current directory. Al bootstrap time, the 
master directory becomes the current directory. The 
DIR command specifies another directory as the 
current directory. If the directory hasn't been 
initialized, DIR wit! initialize it. 

Switches: 

None. 

Examples: 

DIRACCTSDUE) 

Make directory ACCTSDUE the current directory. 

DIRDPlrMYDIR) 

Make directory MYDIR, in directory DPI, the current 
directory. 

DIR %MDIR%;BILLING 

Make directory BILLING, in the master directory, the 
current directory. 

DIR DPOF:MYPART:SUBDIR} 

Make SUBDIR, which is a subdirectory in secondary 
partition MYPART, on disk DPOF, the current directory 
(RDOS). 



I^laGeneml 

SOFTWARE DOCUMENTATION 

DISK 

Display the number of disk blocks used 
and remaining 



Format: 

DISK) 

Return a decimal count of the number of blocks left 
and the number of blocks used in the current partition 
or diskette. DISK returns two figures, and their sum is 
always integer-divisible by 16. 

Aside from user files, the bootstrap root and the 
system require al least Idso blocks; other directories 
require some space for their system and map 
directories. 

Switches: 

None. 

Examples: 

DISK) 

LEFT: 520 USED: 88 

This response, from a diskette, indicates that 520 out of 
a total of 608 blocks are still available. 

DISK] 

LEFT: 1478 USED: 8298 

This response indicates that 1478 blocks from the 
original 9776 are still available for use. 



093-000109-01 



4-23 



DISK 



I^taGeneal 

SOFTWARE DOCUMENTATION 

DUMP 

Copy one or more disk files in DUMP 
format 



Format: 

DUMP dumpfilename [filename} 
filename... 



.][old filenamelS] new 



Copy files from the current directory onto a given file 
or device (dumpfilename). If yoy specify filenames 
(with or without a template), only matching filenames 
are dumped. The filename also can be a secondary 
partition, subdirectory, or DOS directory name (with 
the .DR extension) but it cannot be a disk name. If you 
omit filenames, all nonpermanent files in the current 
directory are dumped. This includes all subordinate 
directories, if any. In other words, if the current 
directory is a primary partition or diskette, the whole 
disk's nonpermanent files will be dumped; if it is a 
secondary partition, it and all its subdirectories and files 
will be dumped. 

dumpfilename can be a disk directory (specifiers 
permitted), or it can be a mag tape, cassette, or paper 
tape file. 

During the dump, directory information is written as a 
header to each dumped file. This information includes 
the filename, length, attributes and other data; it is 
taken from the directory's SYS. DR. When you LOAD 
the DUMPed file, the header data goes back into its 
directory's SYS. DR. For the formal of dump files, see 
-Appendix C. 

A note to DOS users: If the source for the dump is a 
wriie-protecied diskette, all files in the dump file will 
receive the attributes APW. 

NOTE: DUMP'S complementary command is LO.AD. 
If you use FDUMP, a faster version of DU.MP, 
you must reload the files with FLOAD. 



Licensed Material - Property of Data General Corporation 

Global Switches: 

/A Dump all files, permanent and 



/K 

/L 

/S 



/V 



nonpermanent. 

Do not dump links. 

List the dumped files on SLPT 
(overrides/V). 

Dump a file on segments of paper tape. 
The file is punched in segments of up to 
20K bytes each. Each tape segment is 
headed by unique segment number, 
which enables the system to verify that 
tapes will be reLOADed in proper 
sequence. 

Verify DUMPed filenames on the 
console. 



Local Switches: 

rhm-dd-yy/A • Dump only files created this date or 
after. .Arguments mm (month) and dd 
(day) can be one or two digits. 

mm-dd-yy/B Dump only files created before this 
date. 

name/N Don't dump files that match name. 

oname/S name Assign name to this file in the dump, 
but retain its old name (oname) in the 
current directory. 

Template Characters: 

Permitted, 



4-24 



093-000109-01 



Licensed Material - Property ol Data General Corporation 

Examples: 

DIRDPOF) 

R 

DUMP/A/L MTO:0 12-20-77/A) 

Dump all directories and files in DPOF created on or 
after December 20, 1977, to file of the tape on drive 
MTO. This tape then provides backup for these files. 
Listing of dumped files goes to the line printer. 

DUMP/V DPI :SAVEFILES -.SV} 



Dump to file SAVEFILES on DPI all files in the current 
directory with the .SV extension. 

DUMP/A MT0:3 APRIL/S APRIL.DU) 

Dump permanent file APRIL to file 3 of the tape on 
MTO. Name the dumped copy of APRIL APRIL.DU 
(which will allow it to be loaded into the same directory 

as APRIL, if necessary). 

DUMP/A/L DP4:770722.DU - RB/Nf } 
7-22-77/A) 

Create file 770722.DU (named for a dale) on DP4 for 
dump: then dump all files (except .RBs) created on or 
after July 22, 1977 to file 770722.DUon DP4. 



SOFTWARE DOCUMENTATION 



EDIT 

Invoke the Text Editor program 

Format: 

EDIT [filename] 

You can use the text editor to create and edit text files. 
If you include the optional ///('/wwe argument the editor 
will automatically execute the comniand UY filename 
ESC ESC upon being loaded. Ihtftename mmi already 
exist. For more information, see the Text Ediror User's 
Manual. 

Switches: 

None. 



Examples: 

EDIT) 



•HSS 



Program is ready to accept commands. 

You issue editing commands. 

You terminate the editor and return to 
CLI by pressing the H key followed by 
the ESC key twice. 



093-000109-01 



4-25 



EDIT 



I^taGoieral 

SOFTWARE OOCUMENTATrON 

ENDLOG 

Close the file opened by LOG 



Licensed Material - Property of Data General Corporation 

ENPAT 

Insert patch data in a patch file 



Format: 

ENDLOG [password] 

This command closes the log file which you opened by 
a previous LOG command. You must close this file 
before you can TYPE or PRINT ii. To prim or delete the 
log file after closing it, you must type its full name: 
LOG. CM. for a background log file, and FLOG.CM, for a 
foreground log file. If the previous LOG command 
included a password argument, you must use the 
password wiih the ENDLOG command. 

This command, ENDLOG [password], appears in the log 
file. 

Switches: 

None. ' 



Example: 

LOG/HGSTONE) 
R 



ENDLOG GSTONE} 

The password GSTONE is required since it was used 
when the log file was opened. 



Format: 

ENPAT filename 

A patch is a one-word change to a save or overlay file. 
The ENPAT and PATCH utilities allow you to enter 
multiple patches to .SV or .OL files, and'install them 
easily. Patches are most often used to update operating 
system files; Data General supplies current patches 
with its system software. 

The ENPAT command creates patch file filename, or 
opens it for appending if it already exists. ENPAT then 
asks five questions about each one patch, accepts valid 
answers, and places them in filename. To install the 
patches in filename, use the PATCH command. 

For a save CSV) file, a patch can be a symbol, octal 
number, or expression including a symbol, operator, 
and octal number. The most common operators are: 

+ (addition) 

(subtraction) 
@ (indirection) 

The PATCH program will not be able to resolve 
symbols unless you have a load map of the save file on 
disk. You can instruct SYSGEN to save such a map 
with the SYSGEN local switch/L. 

For an overlay (.OL) file, a patch must be an octal 
number or expression. 

ENPAT asks the following questions for each one-word 
patch. If you give an invalid response, it returns an 
error message (explained in Appendix A), and repeats 
the question. First, it asks: 

1 . SAVE FILE (0) OR OVERLAY FILE (1 ) ? 

Answer if the patches in this file will be installed 
in a save file, 1 for an overlay file. Next, it asks: 

2. PATCH LOCATION: 

Enter the location to be patched: number, symbol 
or expression, and }. ENPAT now asks about the 
contents of this location: 

3. CURRENT CONTENTS: 

Type in the current contents of the location, and }. 
For most Data General-supplied patches, this is an 
octal number. Now, ENPAT asks: 



4-26 



093-000109-01 



Licensed Material - Property of Data General Corporation 

4. NEW CONTENTS: 

Respond with the new contenis for the file location 
specified in 2. Next, ENPAT asks about conditions 
for patch installation: 

5. CONDITIONAL:. 

If you want to install the patch unconditionally, 
type }. To install the patch only if a symbol is 
defined in the load map, type the symbol name and 
}. (You might do this if the patch relates to a given 
module, and you don't know if the module is part 
of your system. For example, assume that a patch 
relates only to a device driver named ALPHA. You 
want this patch installed only if ALPHA is defined 
in your system load map, so you'd type ALPHA) .) 
To install the patch only if the symbol is wf defined 
in the load map, type a minus sign (-), then the 
symbol name; e.g., -ALPHA). 

If you want this patch installed conditionally, and 
the condition is the same as you entered for the 
previous patch, simply enter an up arrow (|) and ) 
in response to this question. This allows you to 
easily enter multiple patches which concern one 
condition. 

Next, ENP.AT wants to know if you have more 

patches to enter: 

6. EX1T(0 = N0 1=YES?) 

Answer 0) to return to question 1. and enter 
another patch; answer 1 ) to create the patch file and 
return to the CLI. 



SOFTWARE DOCUMENTATION 



Example: 

Assume that you want to insert the following patches in 
file IPB. for later installation in save file SYS.SV: 



Location 


Old Contents 


New Contents 


IPBQ-t 

(401 S0) + 15 

401 


1 00000 ^IPSTK 


401 m 


401 to 

1 00000 ^IPSTK 

401 tO + 16 



ENPAT IPB) 

CREA TING NEW PA TCHFILE 

SA VEFILE (0) OR O VERLA YFILE (1) .^0) 

PA TCHLOCA TION: IBPQ-1 ) 

CURRENT CONTENTS: 1 00000 + IPSTK) 

NE W CONTENTS: 40 1 @ ) 

CONDITIONAL: ) 

EXIT (0=NO I = YES) ?0) 

SA VEFILE (0) OR O VERLA YFILE (I) ?0) 

PA TCH L OCA TION: (40 1 @ 0) + 1 5 } 

CURRENTCONTENTS:Q) 

NE W CONTENTS: 1 00000 + IPSTK ) 

CONDITIONAL: ) 

EXIT (0=NO I = YES) ?0) 

SA VEFILE (0) OR O VERLA YFILE (I) ?Q) 

PA TCH L OCA TION: 401) 

CURRENT CONTENTS: 40 1 @ ) 

NEW CONTENTS: 401 ©0+16) 

CONDITIONAL: ) 

EXIT(0=NOI = YES)1) 
R 

The PATCH command example continues this, and 
shows installation of the patches in patchfile IPB. 



093-000109-01 



4-27 



ENPAT 



I^teGoioBl 

SOFTWARE DOCUMENTATION 

EQUIV 

Rename a disk or tape drive (RDOS) 



Format: 

EQUIV newname oldname 

Assign a temporary name to a disk or mag tape unit or 
cassette. Newname replaces the oldname until the 
device is RELEASEd. The oldname must be one of the 
disk or tape units shown in Table 2-2. 

Properly applied, this command gives your programs 
device-independence; you can write a generic device 
specifier into your programs, and EQUIV it into a 
specific device at run lime (see the example below). 

You must EQUIV a device before it has been 
initialized; the new name will exist only until the device 
has been released. After release, all devices revert to 
their original specifiers. You cannot EQUIV a name for 
a secondary partition, subdirectory, or the master 
device. 

Global Switch: 

/P Pause for operator intervention. 

Example: 

While writing a program, you have written all magnetic 
tape file references to MYTAPE. This gives your 
program device independence at runtime. Before 
running the program, you issue the commands: 

EQUIV/P MYTAPE MTO) 

MOUNT MYTAPE ON UNIT MTO, STRIKE ANY KEY 

R 

irsIlT MTO) 

FILE DOES NOT EXIST: MTO 

R 

INIT MYTAPE) 

R 

L0AD/NMYTAPE:1) 

MASM2 05/17/77 

MASM4.LS 06/01/77 

R 

EQUIV MTO MYTAPE) 

DIRECTORY IN USE 

R 

RELEASE MYTAPE) 

R 

INIT MYTAPE) 

FILE DOES NOT EXIST: MYTAPE 

R 

After the EQUIV command, the system doesn't 
recognize the EQUfVed device by its' original name 
(MTO); you must IKIT it by its EQUIVed name. You 
can't EQIV a different name until you RELEASE it; 
after release, it discards the EQUIVed name and 
reverts to its original name. 



Licensed Material - Property of Data General Corporation 

EXFG 

Execute a program in foreground 
memory (RDOS) 



Format: 

EXFG programname 

The EXFG command executes a program in 
foreground memory. It works the same way as the 
filename command at the beginning of this chapter, 
except that it tries to execute the program between 
foreground boundaries, instead of in background 
space. You can terminate a foreground program by 
typing CTRL-F from the background console. In a 
mapped system, you establish the foreground 
boundaries with the SMEM command; in an 
unmapped system, you set boundaries in the program 
itself, with the RLDR /F and /Z address switches. 

As shown- in Chapter 3, foreground and background 
programs can access the same directory, initialize or 
release directories, and open the same file. 

The way you use EXFG will depend on whether vour 
system is mapped or unmapped. RDOS offers several 
system calls for handling foreground and background 
programs, as described in Chapter 6 of the RDOS 
Reference Manual. 

Before you execute any program in the foreground, 
you may want to check its memory requirements with 
the SEDIT or OEDIT utilities. 

Mapped Systems 

In a mapped system, you can execute any program in 
the foreground if you have allotted enough memory 
with the SMEM command. You can execute 
noninteractive programs (like assemblies or 
compilations) in the foreground; or you can EXFG 
interactive programs like the CLI and access them 
through the foreground console(s). 

A foreground CLI has different names for its files- 
LOG.CM, COM.C.M, and CLI.CM are named 
FLOG.CM, FCOM.C.M, and FCLI.CM. 

To execute an assembly, compilation, or any program 
in the foreground, type the command line exactly as 
you would for the background, but precede it miih 
EXFG //£/. 



4-28 



093-000109-01 



Licensed Material - Property of Data General Corporation 

Unmapped Systems 

In an unmapped system, you must load a program with 
foreground memory boundary information before you 
can execute ii in the foreground. Do this with switches 
in the RLDR command. Two utility programs you can 
run in an unmapped foreground are the Text Editor 
(EDIT.RB) and the Muliiterminal Text Editor 
(MEDIT.RB). If you choose, you can configure one of 
these with boundary addresses via RLDR, and use it to 
edit text in the foreground (on a second console). 

Before you EXFG any user program, load and run it in 
the background, and check its ZREL and NREL 
requirements with SEDIT, or OEDIT, or the load map 
before reloading it for execution in the foreground. 
Also, it'a a good idea to check the requirements of any 
background programs you plan to run concurrently (or 
CLI.SV, if you want to keep the CLI active in the 
background). 

If you attempt to EXFG a program which would require 
space needed by the CLI, RDOS will reject the 
command, and display the message: 

INSUFFICIENT MEMORY TO EXECUTE PROGRAM 

When you e.xecute a program in the foreground, the 
CLI remains active in the background. You can now try 
to execute another program in the background.. 

Global Switches: 

/D Pass program control to the debugger. 



EfetaGeneral 

SOFTWARE DOCUMENTATION 



/E 



Assign equal priority to foreground and 

background (normally, the foreground 
program has priority). 



Examples: 
Common: 

EXFG DPI :RMON) 

The system now tries to execute program RMON, on 
primary partition DP1, in foreground memory. In a 
mapped system, the foreground as set by SMEM must 
accommodate RMON; if RMON won't fit, the system 
will return the error message: 

INSUFFICIENT MEMORY TO EXECUTE PROGRAM 

In an unmapped system, RMON must have been loaded 
with foreground boundary information. If the 
foreground RMON creates for itself would overwrite 
CLI space in memory, the system will also display the 

message: 

INSUFFICIENT MEMORY TO EXECUTE PROGRAM 

In either system, if RMON executes, the CLI will 
remain active in the background; this user could then 
try to execute a different program in the background. 
Again, if the background lacks enough space to execute 
the program, RDOS will display the INSUFFICIENT 
MEMORY message. 

Unmapped 

Assume that program RECAST.SV has been run and 
debugged in the background, and that it has been 
written with system calls to communicate with the 
console. Also assume that the current RDOS system 
requires about 8,500 words, and that it is a 32K system. 
Using SEDIT or OEDIT, you check the NMAX of 
RECAST.SV and CLI.SV, then load RECAST for 
foreground execution: 

RLDR RECAST.RB 250/Z 40000/F RECASTF.SV/S) 
R 

This configures RECASTF.SV to run the high section of 

user ZREL and NREL memory. 

You now try to EXFG RECASTF; if it executes, you can 
try to execute another program in the background. 



093-000109-01 



4-29 



EXFG 



DataGeneral 

SOFTWARE OCX:UMENTATION 

EXFC (continued) 



Mapped 

R 

GMEM) 

BG:52FG:0 

Check the memory allotment for each ground: 52K for 
background, none for foreground. 



SMEN20} 
R 

EXFG MAC/L/U PARU/S USR/Sf) 
SOURCE<1.2,3.4.5>f} 
BACKUP PROG < 1,2.3. 4,5, 6 7>) 

R 

Assemble a complex program in the foreground. 

NEWFILE} 



Execute NEWFILE in the background. 

Also see the example near the end of Chapter 3. 



Licensed Material - Property of Data General Corporation 

FDUMP 

Fast-dump all files in the current 
directory to magnetic tape (RDOS) 



Format: 

FDUMP [AfTfL'iapeJiknimiberl 

The FDUMP command is a faster version of DUMP. 
You cannot specify filenames in this command; it 
copies all permanent and nonpermanent files in the 
current directory to tapefilenumber. on unit MTn. 
FDUMP works only with mag tape, and the dump files 
it produces must be loaded with FLOAD. It is faster 
than DUMP, and uses less tape. 

With the /A switch (described below), you can specify 
a second drive to continue receiving the dump when 
file space on the first tape is exhausted. If vou do not 
specify a second drive. FDU.MP will prornpt you to 
mount another tape when file space is exhausted.' 

FDUMP automatically INITs the drive specified, and 
RELEASES it after command execution. FDUMP and 
FLOAD are utility programs which generally reside in 
the master directory; you can link to them from other 
directories. 

Do wor mix FDUMP and DUMP files on one tape. File 
access is easier if you FDUMP to file only. FDUMP 
writes three EOF marks after each dumped file; this 
means that you can slack dumps on a single reel by 
dumping to file 0, 3, 6, 9, 12, and so on. When you 
FLOAD the dumpfiles, you will address these as files 
0,3,6,9, 12, and so on. 

Note that FDUMP is a multitasking program, 
configured for a specific kind of system (e.g.,' 
unmapped NOVA); thus you cannot use your version 
on a different kind of system (e.g., mapped NOVA). 

Global Switches: 



/L 



/V 



List filenames on the line printer as they 
are dumped. 

List filenames on the console as they are 
dumped. 



Local Switches: 

MTn:0/A Continue dump on tape file of alternate 

drive n when space is exhausted on first 
drive. 

name/L Send dumped filenames to file name. 



4-30 



093-000109-01 



Licensed Material - Property of Data General Corporation 

Examples: 

DIR DPO) 

R 

FDUMP/VMTO:0} 

Fast-dump every file on DPO to file of the tape on 

drive yio. 

DIRDPOFiSUBDIR) 

R 

FDUMPMTO:OMYFILE.-) 

INVALID COMMAND STRING! 

R 

Yoy cannot FDUMP specific filenames. 

DIR DPO) 

R 

FDUMP/V MTO:0) 



sMOUNT NEXT REEL STRIKE KEY WHEN READY 

When space is exhausted, FDUMP prompts for 
another tape. 

(The next example assumes one blank 2400-foot tape 
on MTO, another on MTl.) 

DIR DZO) 

R 

FDUMP/L MTO:0 MTl :0/A} 



I^taGoieral 

SOFTWARE DOCUMENTATION 

FGND 

Describe whether or not a foreground 
program is running 



Format: 

FGND} 

This command returns one of two messages, 
depending on whether or not a program is running in 
the foreground. 

Switches: 

None. 

Example: 

FGND) 

NO FOREGROUND PROGRAM R UNNING 

R 

EXFGMYPROG) 

R 

FGND) 

FOREGROUND PROGRAM RUNNING 

R 



Dump the contents of the 6060-series disk in unit to 
the tape on MTO; when space runs out on this tape, 
continue the dump on file of the tape on MTl. A 

listing goes to the line printer. 



093-000109-01 



4-31 



FGND 



SOFTV¥ARE DOCUMENTATION 

FILCOM 

Compare two files 



Format: 

FILCOM filenamei filenamea 

Compare two files, word by word, and print dissimilar 
word pairs in octal on your console (unless you use the 
/L switch). File organizations of the two files may 
differ; e.g., you can compare a random and contiguous 

file. 

Local Switches: 

name/L Send output to this file. 

Example: 

FILCOM YIN YANG SLPT/L) 

Compare files YIN and YANG word-by-word. Print any 
dissimilar word pairs in octal on the line printer, along 
with their respective word displacements in the files: 



025/ 


044516 


042530 


141/ 


000014 


020044 


142/ 


000000 


046120 


143/ 


000000 


052057 


144/ 


... 


046015 


145/ 


— 


000014 



YANG is two words longer than YIN -note the dashes 
for these locations in YIN. If either YIN or YANG were a 
null file, FILCOM would print the entire contents of 
the other file: it would print dashes for the null file. 



Licensed Material - Property of Data General Corporation 

FLOAD 

Fast-load fast-dumped files into the 
current directory (RDOS) 



Format: 

FLOAD [MTn:tapefilennmber] 

FLOAD is the counterpart of FDUMP; it loads all files 
in tapefilenumber into the current directory. The files 
must have been FDUMPed (not DUMPed). You 
cannot specify filenames in FLOAD; it tries to load all 
files in tapefilenumber. If a file in tapefilenumber 
already exists in the current directory, FLOAD prints a 
FILE ALREADY EXISTS message, does not load the 
file, and continues. 

FLOAD automatically INITs (but does /70/ RELEASE) 
the drive specified. The dump file header indicates the 
cwrren/ directory, not the directory being loaded. 

If you FDUMPed a file on multiple reels, on the same 
drive, FLOAD will request another tape when it has 
loaded all files on the current tape. 

You cannot FLOAD a dumpfile which contains a 
partition into a secondary partition, subdirectory, or 
DOS directory. If you try, youMl get a DIRECTORY 
DEPTH EXCEEDED message and the load will abort. 
This might happen if you had dumped an entire disk, 
and tried to load this dumpfile when the current 
directory was a secondary partition, or subdirectory. 

If the tape you are loading has stacked FDUMP files on 
it, these files have the same numbers for loading (0, 3, 
6, etc.). 

FLOAD, like FDUMP, is a multitasking program, 
configured for a specific kind of system; your version 
will not work on a different kind of system. 



Global Switches: 

/L 



m 



/v 



Print filenames on the line printer as 
they are loaded. 

Do not load files; display names on the 
console (or send them to the file 
specified by global or local /L ). 

Display filenames on the console as ihey 
are loaded. 



4-32 



093-000109-01 



Licensed Material - Property of Data General Corporation 

Local Switches: 

name/L Send filenames to file name. 

Examples: 

DIR DPO) 

R 

FLOAD/VMT0:0) 



Fasi-Ioad all files in file of the tape on MTO into 
current directory DPO. 

FLOAD/N MTO:0) 



Display the filenames in MTO:0 on the console; do not 

load files. 

In the last example for FDUMP, assume that you want 
10 copy all files in the large dump to another big disk. 

DIR DZO) 

FLOAD MTO:0 LOADLOG/L) 



MOUNT NEXT REEL STRIKE KEY WHEN READY 
TAPE HAS WRONG REEL NO. 
MOUNTCORRECTREEL AND STRIKE A KEY 



This dump included two tapes. When FLOAD finished 
loading the first reel, il prompted for a second. This 
user mounted the wrong reel and struck a key; 
FDUMP then prompted for the correct reel. When the 
right reel was mounted and a key struck, FDUMP 
loaded the second reel. The load listing went to disk file 
LOADLOG. 



I^taGoieral 

SOFTWARE DOCUMENTATION 



FORT 

Compile a FORTRAN IV file 

Format: 

FORT filenamei [...filename^ J 

Compile a FORTRAN IV source file. As output, you 
can specify a binary file, an intermediate source file, a 
listing file, or combination of all three. For this 
command to execute, the following files must be 
available in the current directory (or available via 
links): FORT.SV (the FORTR.Xn IV interface), 
FIV.SV (the compiler), and AS.M.SV (the extended 
assembler). The command name. FORT, cannot be 
changed. 

On input, the command searches for inputfilename.FR; 
if not found, it searches for inputfilename. 

If you omit switches, the FORT command produces an 
intermediate source file, filename.SR (output of 
compilation). It then invokes an assembler which 
produces a binary file. After a successful assembly, the 
system deletes the intermediate source file. No fisting 
is produced by the default command. 

Global Switches: 

/A Suppress assembly (intermediate source 

file is deleted unless you use global/S). 
Useful for checking compile errors. 



/B 

/E 

/F 



/L 

m 

19 

/s 
/u 

/x 



List compiler source program input only. 

Suppress error messages from compiler. 
(Assembler error messages are not 
suppressed.) 

Equivalence FORTRAN variable names 
and statement numbers to symbols 
acceptable to the assembler. (Include /U 
to inform the Debugger of the /F 
names.) 

Produce listing file (fdename.LS, ). 

Do not produce relocatable binary file. 
Useful for checking assembly errors. 

Compile no more than 72 columns per 
line (as in punched card images). 

Save the intermediate source file. 

Append user symbols during the 
assembly phase (must be used with /F). 

Compile statements with Jin column L 



093-000109-01 



4-33 



FORT 



DataGeneral 

SOFTWARE DOCUMENTATION 

FORT (continued) 



Local Switches: 

name/B Direct relocatable binary output to nie 

name (overrides global /N). 

name/E Direct error messages to file name 

(overrides global /E). 

name/L Direct listing output to file name 

(overrides default name specified by 
global /L). 

name/S Direct intermediate source output to file 

name. 

Examples: 

FORT/LMAIN) 

Compile and assemble FORTRAN IV program MAIN 
or MAIN.FR to produce binary file MAIN.RB; send both 
a compiler and an assembler listing to file M AIN.LS. 

FORT/F/U DPI :TABLE SLPT/L) 

Compile and assemble FORTRAN IV file TABLE.FR 
(or TABLE) on DPI and produce binary file TABLE.RB. 
Write compiler and assembler listings to the line 
printer, and append user symbols during assembly. 



Licensed Material - Property of Data General Corporation 

FORTRAN 

Compile a FORTRAN 5 file (RDOS) 



Format: 

FORTRAH Jllename,' [...Jilename, J 

Perform a FORTRAN 5 compilation. Output mav be a 
bmary file, a listing file, or both. See the FORTRAN i 
User's Manual and the FORTRAN 5 Supplemem for 
more information. 

The CLI searches for filename.FR: if not found it 

searches tor filename. 

Global Switches: 

/B 



/C 
/D 

/I 

/K 

/L 

m 
IP 



Brief listing (compiler source program 
input). 

Check synta.x only. 

Debug aid. Give line number and 
program name on all runtime error 
messages. 

Don't list source lines from INCLUDE 
files. 

Do not delete compiler temporary files 
after compilation. 



Produce a 
filename.LSi. 



listing file named 



/S 

/x 



Compile, but do nor create a binary file. 
Useful for checking compile errors. 

Punched card input: only the first 72 

characters of each input line are used as 
compiler source code, but the entire 
input line is sent to the listing file (if one 
exists). 

Generate code for subscript checking. 

Compile statements with Jin column 1. 



4-34 



093-000109-01 



Licensed Material - Property of Data General Corporation 

Local Switches: 

name/B Give binary output file this name. 

Send error output to file name. 



name/E 
name/L 



Send listing output to file name 

(overrides global /L). 



Examples: 

FORTRAN/LMAIN} 

Produce binary file MAIN.RB with both a compiler and a 
source listing to file M.AIN.LS. 

FORTRAN BMARK FLIST/L) 

Compile FORTRAN 5 source program BMARK or 
BMARK. FR and output source and compiler listings to 
disk file FLIST. 



I^taGeneral 

SOFTWARE DOCUMENTATION 

FPRINT 

Print a disk file in the specified format 



Format: 

FPRINT filename 

Print a disk file in either bytes, decimal, hexadecimal, 
or octal, with printable ASCII characters on the right 
side. Any nonprinting characters are reported as 
periods (.). If you omit switches, the locations are 
printed in octal on the console. You can specify a first 
and last location with local switches. 

FPRINT offsets locations by 168 unless you include the 
/Z switch. 

Global Switches: 



/B 
/D 
/H 
/L 
/O 
/Z 



Print in byte format. 

Print in decimal. 

Print in hexadecimal. 

Use the line printer. 

Print in octal (default). 

Print locations starting at zero. 



Local Switches: 

n/F Start at location n (octal). 

name/L Send output to file name (overrides 

global /L). 

n/T Slop at location n (octal). 

Examples: 

FPRINT/LTE1} 

Print file TE1 on the line printer. The mode is octal by 

default. 

FPRINT/B/L MYFILE 2000/F 3500/T) 

Print MYFILE in byte formal on the line printer, from 
location 2000 to 3500. 



093-000109-01 



4-35 



FPRINT 



I^taGeneral 

SOFTWARE DOCUMENTATION 

GDIR 

Display the current directory name 



Format: 

GDIR 

Switches: 

None. 

Examples: 

GDIR) 

MANHATTAN 

MANHA TTANis the current directory. 

RELEASE %GDIR%} 
Release the current directory. 



Licensed Material - Property of Data General Corporation 

GMEM 

Display background/foreground memory 
size (mapped RDOS) 

Format: 

GMEM 

Display the current memory allotment to background 
and foreground program areas. The size is given in 
2048-byle blocks. GMEM works only on machines with 
mapped addressing. 

Switches: 

None. 



Example: 



GMEM) 
BG: SO 



FG: 34 



61,440 bytes of memory (30 times 2,048) are available 
to the background, and 69,632 bytes of memory are 
available to the foreground. 



4-36 



§93-000109-01 



Licensed Material - Property of Data General Corporation 

GSYS 

Display the name of the current 
operating system 

Format 

GSYS 

Switches: 

None. 

Examples: 

GSYS} 
SYS 

The current operating system is named SYS. The 
system does not display its save Tile extension, .SV. 



DataGeneral 

SOFTWARE DOCUMENTATION 



GTOD 

Display the time and date 

Format: 

GTOD 

Switches: 

None. 

Example: 

GTOD} 

12/17/7721:24:20 

The message indicates that the lime is 20 seconds after 
9:24 p.m., and the date is December 17, 1977. 



XFER/A STTI OPSYS.MC) 

MESSAGE THE CURRENT SYSTEM IS %GSYS%) 

CTRLZ 

R 

OPSYS} 

THE CURRENT SYSTEM IS SYS64K 

R 

GSYS can be a system-defined variable; the current 
system is SYS64K.SV 



093-000109-01 



4-37 



GTOD 



Licensed Material - Property of Data General Corporation 

Local Switches: 

name/L Send filenames lo file name. 

Examples: 

DIR DPO) 

R 

FLOAD/V MTO:0) 



Fast-load all files in file of the tape on MTO into 
current direciorv DPO. 



DataGeneral 

SOFTWARE DOCUMENTATION 



FLOAD/N MTO:0) 



Display the filenames in MTO:0 on the console; do not 
load files. 

In the last e.xample for FDUMP, assume that you want 
to copy ail files in the large dump to another big disk. 

DIRDZO} 

FLOAD MTO:0 LOADLOG/L) 



MOUNT NEXT REEL, STRIKE KEY WHEN READY 

TAPE HAS WRONG REEL NO. 

MOUNT CORRECT REEL AND STRIKE A KEY 



This dump included two tapes. When FLOAD finished 
loading the first reel, it prompted for a second. This 
user mounted the wrong reel and struck a key; 
FDUMP then prompted for the correct reel. When the 
right reel was mounted and a key struck, FDUMP 
loaded the second reel. The load listing went lo disk file 
LOADLOG. 



FORT 

Compile a FORTRAN IV file 

Format: 

FORT filenamci [...filename^ ] 

Compile a FORTRAN IV source file. As output, you 
can specify a binary file, an intermediate source file, a 
listing file, or combination of all three. For this 
command to e.xecute, the following files must be 
available in the current directory (or available via 
links): FORT.SV (the FORTR.AN IV interface), 
FIV.SV (the compiler), and AS.M.SV (ihe extended 
assembler). The command name, FORT, cannot be 
changed. 

On input, the command searches I'or inpulfilename.FR; 
if not found, it searches for inputfilename. 

If you omit switches, the FORT command produces an 
intermediate source file, filename.SR (output of 
compilation). It then invokes an assembler which 
produces a binary file. After a successful assembly, the 
system deletes the intermediate source file. No fisting 
is produced by the default command. 

Global Switches: 



/A 

/B 

/E 

/F 



/L 

m 

/p 

/s 
/u 

/x 



Suppress assembly (intermediate source 
file is deleted unless you use global/S). 
Useful for checking compile errors. 

List compiler source program input only. 

Suppress error messages from compiler. 
(Assembler error messages are not 
suppressed.) 

Equivalence FORTRAN variable names 
and statement numbers to symbols 
acceptable to the assembler. (Include /U 
to inform the Debugger of the /F 
names.) 

Produce listing file (filename. LSi ). 

Do not produce relocatable binary file. 
Useful for checking assembly errors. 

Compile no more than 72 columns per 
line (as in punched card images). 

Save the intermediate source file. 

Append user symbols during the 
assembly phase (must be used with /F). 

Compile statements with X'm column 1. 



093-000109-01 



4-33 



FORT 



DataGeneral 

SOFTWARE DOCUMENTATION 

FORT (continued) 



Local Switches: 



name/B 



name/E 



name/L 



name/S 



Direct relocatable binary output to file 
name (overrides global /N). 

Direct error messages to file name 
(overrides global /E). 

Direct listing output to file name 
(overrides default name specified by 
global /L). 

Direct intermediate source output to file 
name. 



Examples: 

FORT/L MAIN) 

Compile and assemble FORTRAN IV program MAIN 
or MAIN.FR to produce binary file MAIN.RB; send both 
a compiler and an assembler listing to file M AIN.LS. 

FORT/F/U DPI :TABLE SLPT/L) 

Compile and assemble FORTRAN IV file TABLE.FR 
(or TABLE) on DPI and produce binary file TABLE.RB. 
Write compiler and assembler listings to the line 
printer, and append user symbols during assembly. 



Licensed Material - Property of Data General Corporation 

FORTRAN 

Compile a FORTRAN 5 file (RDOS) 



Format: 

FORTRAN /i7e/wwe, (...filename^ / 

Perform a FORTRAN 5 compilation. Output mav be a 
bmary file, a listing file, or both. See the FORTRAN 5 
User's Manual and the FORTRAN 5 Supplement for 
more information. 

The CLI searches for Jllename.FR: if not found it 

searches fotjllename. 

Global Switches: 

/B 



/C 

/D 

/I 

/K 

/L 

/N 

/P 



/S 
/X 



Brief listing (compiler source program 
input). 

Check synta.x only. 

Debug aid. Give line number and 
program name on all runtime error 
messages. 

Don't list source lines from INCLUDE 
files. 

Do not delete compiler temporary files 
after compilation. 



Produce a 
filename.LSi. 



listing file named 



Compile, but do not create a binary file. 
Useful for checking compile errors. 

Punched card input: only the first 72 
characters of each input line are used as 
compiler source code, but the entire 
input line is sent to the listing file (if one 
exists). 

Generate code for subscript checking. 

Compile statements with Jin column L 



4-34 



093-000109-01 



Licensed Material - Property of Data General Corporation 

Local Switches: 

name/B Give binary output file this name. 

Send error output to file name. 



name/E 
name/L 



Send listing output to file name 
(overrides global /L). 



Examples: 

FORTRAN/LMAIN) 

Produce binary file MAIN.RB with both a compiler and a 
source listing to file M AIN.LS. 

FORTRAN BMARK FLIST/L) 

Compile FORTRAN 5 source program BMARK or 
BMARK. FR and output source and compiler listings to 
disk file FUST. 



IMaGoieral 

SOFTWARE DOCUMENTATION 

FPRINT 

Print a disk file in the specified format 



Format: 

FPRINT filename 

Print a disk file in either bytes, decimal, hexadecimal, 
or octal, with printable ASCII characters on the right 
side. Any nonprinting characters are reported as 
periods (.). If you omit switches, the locations are 
printed in octal on the console. You can specify a first 
and last location with local switches. 

FPRINT offsets locations by 168 unless you include the 
/Z switch. 

Global Switches: 

/B Print in byte format. 

/D Print in decimal. 

/H Print in hexadecimal. 

/L Use the line printer. 

/O Print in octal (default). 

/Z Print locations starting at zero. 

Local Switches: 

n/F Start at location n (octal). 

name/L Send output to file name (overrides 

global /L). 

n/T Stop at location n (octal). 

Examples: 

FPRINT/LTE1} 

Prim file TEI on the line printer. The mode is octal by 

default. 

FPRINT/B/L MYFILE 2000/F 3500/T} 

Print MYFILE in byte format on the line printer, from 
location 2000 to 3500. 



093-000109-01 



4-35 



FPRINT 



I^toGoieral 

SOFTWARE DOCUMENTATION 

GDIR 

Display the current directory name 



Format: 

GDIR 

Switches: 

None. 

Examples: 

GDIR) 

MANHATTAN 

MANHATTAN'is the current directory. 
RELEASE %GDIR%) 
Release the current directory. 



Licensed Material - Property of Data General Corporation 

GMEM 

Display background/foreground memory 
size (mapped RDOS) 

Format: 

GMEM 

Display the current memory allotment to background 
and foreground program areas. The size is given in 
2048-byte blocks. GMEM works only on machines with 
mapped addressing. 

Switches: 

None, 

Example: 

GMEM) 

BG: 30 FG: 34 

61,440 bytes of memory (30 times 2,048) are available 
to the background, and 69,632 bytes of memory are 
available to the foreground. 



4-36 



093-000109-01 



Licensed Material - Property of Data General Corporation 

GSYS 

Display the name of the current 
operating system 

Format 

GSYS 

Switches: 

None. 

Examples: 

GSYS) 
SYS 

The current operating system is named SYS: The 
system does not display its save file extension, .SV. 



DataGeneral 

SOFTWARE DOCUMENTATION 



CTOD 

Display the time and date 

Format: 

GTOD 

Switches: 

None. 

Example: 

GTOD) 
12/17/7721:24:20 

The message indicates that the time is 20 seconds after 
9:24 p.m., and the date is December 17, 1977. 



XFER/A STTl OPSYS.MC) 

MESSAGE THE CURRENT SYSTEM IS %GSYS%} 

CTRLZ 

R 

OPSYS) 

THE CURRENT SYSTEM IS SYS64K 

R 

GSYS can be a sysiem-defmed variable; the current 
system is SYS64K.SV 



093-000109-01 



4-37 



CTOD 



IMaGoieral 

SOFTWARE DCXrUMENTATION 



INIT 



Initialize a directory or tape drive 



Licensed Material - Property of Data General Corporation 

Local Switches: 

None. 



Format: 

I tape drive \ 

INIT< C 

( directory [subord'mate-dir][:sub-subordmate-dir] i 

By initializing a device or directory, you introduce it to 
the operating system; before the introduction, all of its 
files are effectively closed. At any moment, many 
directories on a device can be initialized, while only one 
remains the current directory. 

Bootstrapping automatically INITs the directory which 
holds the current system. 

After you INIT a directory or device, you can access all 
files within it; you can use the colon specifier (e.g., 
DPO:AB) at will. All files on the initialized tape unit' 
directory or diskette are available until you release 
(RELEASE command) the device or directory. 

The DIR command performs all INIT functions, and 
selects another current directory - which saves a step if 
you want to change the current directory. You cannot 
use DIR on a tape drive. 



Examples: 

INITDP4) 

Initialize the disk in DP4. 

INIT/FMT1) 

Mag tape or cassette initialization rewinds the tape to 
the beginning-of-tape mark. Full (/F switch) 
initialization of MT1 rewinds the tape on drive MT1, 
erases it and writes two EOF's at the beginning. (The 
system begins writing files on the tape at the double 
end-of-file.) 

INIT DPI :ABC) 

Initialize directory ABC on DP1 . All files in DPI and 
ABC are now accessible. If ABC is an RDOS partition, 
you must INIT or DIR to its subdirectories, or direct 
file access with explicit global/directory specifiers 
(including colon separators). 



Global Switch; 



/F 



Full initialization (tapes or disk specifiers 
only). This clears all existing files and 
information from on the disk or tape; on 
a disk, it writes a new system file 
directory and map directory. If you issue 
INIT/F to a secondary partition or 
subdirectory, the /F switch is ignored 
and a simple INIT occurs. Full 
initialization of a tape unit rewinds the 
tape and writes two EOF's at its 
beginning, effectively erasing the tape by 
allowing the system to write files on it. 



4-38 



093-000109-01 



Licensed Material - Property of Data General Corporation 

LDIR 

Display the name of the last current 
directory 



Format: 

LDIR 

Return the name of last directory "DIRed" to. 

Switches: 

None. 



Example: 

GDIR) 

SUBDIR 

R 

DIRDPO) 

R 

LDIR) 

SUBDIR 

R 

DIR%LDIR%} 

R 

GDIR) 

SUBDIR 

This sequence gets the current directory, changes it to 
DPO, changes it back, then uses LDIR as a CLI variable, 
and checks the result. 



DataGeneral 

SOFTWARE DOCUMENTATION 



LFE 



Edit library files 

Format: 

LFE A library 1 ... [binary ■, .../ 

LFE D library [newlibrary/Ol binary ^ ... 

LFE I library [newUbrary/Oj binary ^ ... 

LFE N [newiibrary/OJ binary ^ f...btnary„ J 

LFE M library, librarya ... [newlibrary/Ol 

LFE R library fnewlibrary/Oj binary ^ binary u 
[...binary„ binary „,] 

LFE T library, [...library, ] 

LFE X library binary, [...binary„] 

Invoke the Library File Editor utility, which allows you 
to create, edit, and analyze library files. Library files are 
groups of assembled binary files, which conventionally 
have the extension ''.LB". You may want to assign this 
extension to the libraries you create. See the LFE 
manual for more information. 

LFE works with copies of original files; it does not alter 
the originals. 

Function keys A, D, I, M, N. R. T, and X direct LFE 
operation. The library, binary, and newlibrary words 
represent existing library names, relocatable binary 
files (RBs), and new library names, respectively. 

Each LFE function key has the following effect: 

A Analyze symbols and sizes of one or more libraries 
or binaries. To analyze separate RBs, append the 
local /B switch to the binary name. The analysis 
lists symbols, symbol types, and reference flags; it 
does not produce a new library file. The default 
listing file is the line printer. 

Analyze Switches: 

/M This global switch (A/M) instructs LFE to 

analyze all libraries following as a single 

library. 

binary/B This binary'm an RB file, not a library. 

binary/F Insert a form feed before printing 
analysis of binary. 



093-000109-01 



4-39 



LFE 



DataGeneral 

SOFTWARE DOCUMENTATrON 

LFE (continued) 



D Delete binary file(s) from library, producing 

newlibra/y. If you omit newlibrary/O, LFE names the 
new library D.Ll. 

I Insert binary file(s), combining them with binaries 
in library, producing newlibrary. If you omit 
newtibran>/0. LFE names the new library I.LL If you 
omit /A or /B (below), LFE inserts all binaries at 
the beginning of the new library. 

Insert Switches: 

binary/A Insert after. The binary name(s) 
following the switch will be inserted after 
binary. 



binary/B Insert before. The 
following the switch 
before binary. 



binary name(s) 
will be inserted 



M Merge libraries into one file named newlibrary^ If 
you omit newlibrary/O, LFE names the new library 
M.Ll. 

N Create new library file newlibrary from one or more 
binary files. If you omit newlibran'/O, LFE names 
the new library N.Ll. 

R Replace binary file(s) in library with other binary 
riie(s), producing newlibrary. The first binary 
argument is the original binary name; the second is 
the binary name that will replace the original. If vou 
omit newlibrary/O. LFE names the new file R.LL 

T Send the titles of binaries in library to the listine file 
CSLPT by default). 

X Extract one or more binary files from library. You 
must specify the original .TITL of each binary. 
Output is one or more binaries named binary. RB. 

Local Switches: 



name/L 



name/0 



Send listing output (A or T keys) to file 
name. The default listing file is the first 
line primer. SLPT. 

Assign this name to the new library file. 
The name overrides LFE default names 
in the D, I, L, M, N, and R commands. 



Licensed Material - Property of Data General Corporation 

Extensions: 

If you enter no extensions for library or binary, LFE 
searches for library.LB or binary.RB respectively. If it 
does not find them, it searches for library or binary 
LFE does «o/ assign the extension ".LB" to newlibrary 
names you specify; you may want to include it in the 
name. See the above description of keys for the default 
names of new libraries. 

Examples: 

LFE N $PTP/0 A.RB C.RB/B) 

Create a new library file from binaries A.RB and C.RB- 
punch it on the paper tape punch. 

LFE A/M 2UT1 .LB ZUTO.RB) 

Analyze as one library 2UT1.LB and the binarv file 
ZUTO.RB. Analysis goes to the line printer. 

LFE I MAL.LB MALI .LB/0 RSK/A MODI } 

In library MAL.LB, insert binary M0D1.RB after binary 
RSK. Name the new library MODI .LB. 

LFEAMYLIB(1.2.3).LBMYLIB(1,2.3).AN/L} 

Analyze libraries MYLIBl.LB. MYLIB2.LB. and 
MYLIB3.LB; store analysis in disk files MYLIBI AN 
MYLIB2.AN, and MYLIB3.AN. 



4-40 



093-000109-01 



Licensed Material - Property of Data General Corporation 

LINK 

Create a link entry to a file 



Format: 



LINK 



resfilename/2 



linkname M>ecfon'.7resfilename 



Create a link entry in the current directory to a 
resolution file (resfilename) or to another link entry. 

Use the first form to link to a file in the current 
directory's parent directory. The parent directory holds 
the current directory; it can be a disk (e.g., DPO) or an 
RDOS secondary partition. This form gives the link the 
same name as the resolution file. Since utility programs 
are usually in the master directory (along with the 
operating system), you can link to each utility file using 
this format, if the parent directory is the master. 

Use the second format if; 1) you want your link's name 
to ditTer from the resolution file's (it' will be an alias 
name); or 2) the resfilename is not in the current 
directory's parent directory. For an alias linkname. vou 
can use any legal filename, but remember that the link 
will be useless if you forget its name. For either 1) or 
2), if the resolution Tile is a save or overlay file, your 
linkname must include the .SV or .OL extension. ' 

Before you can create or use a link, all directories 
involved in the resolution chain must be initialized. 

The system gives no error message if it can't find the 
resolution file, so you should check a link after you 
create it to see if it works. For example, assume thai'the 
current directory is DPI, and you want to link to file 
EDIT.SVinDPO: 

LINK EDIT.SV/2} 

R 

EDITMYFILE) 

LINK DEPTH EXCEEDED: EDIT.SV 



Resolution file EDIT.SV doesn't exist on DPI - so the 
Imk was made to itself. Thus you must remove the link 
and recreate it with a directory specifier: 

UNLINK EDITSV) 
R 

LINK EDIT.SV DPO:EDIT SV) 
R 

EDITMYFILE} 



I^feGeieral 

SOFTWARE DOCUMENTATION 

Some utilities use an overlay file or other files in 
addition to their save files; you must also link these 
files. See each utility command for the names of its 
files. 

You can link to a file whose attributes forbid linking 
(CH.ATR and CHLAT commands), but vou cannol 
use that link. 



Switches: 

None (except local /2) 

Examples: 

Assume that the current directory, DPO has one 
secondary partition, SECONDPART, which has one 
subdirectory, SUBDIRA. Figure 4-1 shows this 
structure, along with links to the Text Editor. (We 
chose EDIT because it uses onlv one file ) For DOS 
assume that SECONDPART is a directory, and skip 
sequences 2 and 3. below. 

1. DIR SECONDPART) 
R 

LINK EDIT.SV/2 
R 

This creates link entry EDIT.SV to the editor in 
SECONDPARTs parent directory: DPO. Anyone in 
directory SECONDPART can now edit a file without 
using a directory specifier. 

2. DIR SUBDIRA) 
R 

LINKTX.SVDPO:EDIT.SV) 
R 

This creates an alias link entry TX.SV to EDIT SV in 
DPO. From SECONDPART, the command TX will 
work exactly as the command EDIT works. 



3. 



LINK DPO:SUBDIR:EDIT.SV EDIT SV) 
R 

This creates the link in SUBDIR to the editor. We 

needed the first directory specifier because SUBDIR 
was not the current directory. 



The editor prompt (') means that the link works. 



093-000109-01 



4-41 



LINK 



EfetaC^eral 

SOFTWARE DOCUMENTATION 

LINK (continyed) 



Licensed Material - Property of Data General Corporation 



LIST 



List file directory information 



4. DIRDPO) 
R 

LINKALIAS.SVEDIT.SV) 
R 

This sequence creates an alias name in the same 
directory as the editor. The command ALIAS will 
work exactly as the command EDIT works. 

To create a link entry to another disk or diskette, 
simply insert the directory specifier before the 
resfilename; e.g., 

DIRDP1} 
R 

LINK EDIT.SV DPO:EDIT.SV) or %MDIR%:EDIT SV) 
R 



Format: 

([filename I ...J 




■ Figure 4-1. Link Entries ■ 



LIST 



[directory-specifier:filename] ' 



List information about one or more files or link entries 
from the current directory or other directories. If you 
omit an argument, the system lists all nonpermanent 
files and link entries in the current directory. 

For each file, LIST returns the filename and one or 
more of the following: file size in bytes, file access 
attributes, link access attributes, file creation date and 
time, date last opened, file starting address in octal 
(UFTAD of UFD), and use count. The link access 
attributes -- if any -- are, preceded by a right slash. The 
file starting address is enclosed within brackets. 

For link entries, the list includes the link name, the 
resolution filename, and the directory specifier (if any) 
given when the link was created. A commerical at sign 
(@) means that the link was originally made to a file on 
its directory's parent partition or diskette. 

The following lists file attributes (or link access 
attributes) and their meanings: 

Character Meaning 

P 



S 

w 

R 
A 



Permanent file: cannot be deleted or 

renamed. 

Save file (core image). 

Write-protected file: cannot be written. 

Read-protected file: cannot be read. 

Attribute-protected file, whose attributes 
cannot be changed. You cannot remove 

the A attribute. 

No resolution entry allowed: links can be 
made, but not used. 

First user-definable attribute (bit 9). 

Second user-definable attribute (bit 10). 



4-42 



093-000109-01 



Licensed Material - Property of Data General Corporation 

The following lists file characteristics and their 
meanings: 

Character Meaning 

D This file is randomly organized. 

C This file is contiguously organized. 

T This file is a partition (RDOS). 

Y This file is an RDOS or DOS directory. 

Global Switches: 

'^ List all files within the current directory, 

both permanent and nonpermanent, 
giving filename, file characteristics and 
attributes, byte count, and link access 
attributes. 



DataGeneral 

SOFTWARE DOCUMENTATION 



/B 
/€ 

/E 

/F 

/K 
/L 

/N 
/O 

/S 

/u 



Briel'listmg: list only filenames. 

List creation time (month/day/year 
hourrminute). 

List every category of file information 
(overrides /B, /C, /F, /O, and /U 
switches). 

List the logical address of the first block 
in the file (0 if unassigned). 

Do not list links. 

Send a listing to the line printer. 

List links only. 

List date file last opened 
(monih/day/year). 

Sort the output list alphabetically. 

List file use count (in decimal). 



Local Switches: 



mm-dd-yy/A List files created this date or after. 
Arguments mm (month) and dd (day) 
can be one or two digits. 

mm-dd-yy/B List files created before this date. 

name/N Do not list files that match this name. 

Template Characters: 

Permitted only when the filename argument is in the 
current directory. 

Examples: 

LIST/E/A) 

This command lists on the console all information for 
every file and link entry in the current directory. A 
typical line of information would look like this: 

A.SV 81 60 SD/N 1 2/23/77 1 3:56 1 2/23/77 [000164] 

In this example, A.SV consists of 8,160 bytes, is a 
randomly organized save file, and is protected from 
link access by the N attribute. It was created at 1:56 p.m. 
of the 23rd day of December, 1977, was last accessed 
on that same dale, has a starting logical block address of 
164, and has a file use count of zero. 

Typical lines describing link entries would look like the 
following: 



ABC.SV 



DPO:DEF.SV 



In this example, the link entry name is ABC.SV; it is an 
alias. The resolution file is DEF.SV in directory DPO. 

EDITSV @:EDITSV 

In this example, the link entry name is EDIT.SV; it was 
created with the same name as the resolution file, in a 
directory subordinate to the resolution file's. 

LIST/K/S-.SV11-2-77/A} 

This command alphabetically lists all save files C.SV 
extension) created after November 1, 1977. It does not 
list links; output goes to the console. 



093-000109-01 



4-43 



LIST 



DataGeneral 

SOFTWARE DOCUMENTATION 

LOAD 

Reload dumped files 



Format: 

LOAD dumpfilename [filename] ...J 

Load a previously dumped file from a given device or 
directory (input filename) into the current directory. If 
you omit filenames and switches, all nonpermanent 
files in the input file are loaded. With global switches, 
you can select filenames for LOADing, or you can 
simply display the filenames in the dump file. 

The LOAD command can load only those files which 
were previously DUMPed; it cannot load a 

fast-dumped (FDUMPed) file or an XFERed file. Files 
to be loaded must bear different names from files in the 
current directory (unless you specify the /N, /O, or /R 
switches). Neither DUMPing nor LOADing change a 
file's access or link attributes, creation date, or 
directory characteristics. 

If files were dumped on segments of paper tape using 
the DUMP/S command, you must follow the DUMP 
sequence when you LOAD them. Failure to follow the 
same sequence will evoke a CLI runtime error 

message. 



Licensed Material - Property of Data General Corporation 



Global Switches: 

Load all files, including permanent files. 

Display a brief listing of loaded files. 

Suppress nonfalalerror messages. 
Do not load link entries. 



/A 

/B 

/E 
/K 

/L 



/N 



/O 



/R 



List loaded filenames on the line printer. 
(Overrides /V switch; if used with global 

/N, produces listing - files are not 

loaded.) 

Do not load files; output the filenames to 

the console. 

Delete current file if it exists and replace 
with file of the same name being loaded. 

Load most recent version of file. When a 
file 10 be loaded has the same name as a 
file in the current directory, the system 
checks both files' creation dales. If the 
existing file is older, it is deleted and 
replaced by the file awaiting loading. If 
the existing file is not older, ii is retained 
and the dumped file is not loaded. 



/V 



Verify the load by listing filenames 
loaded on the console. Filenames in a 
directory are listed before the directory 
name, and they are indented 2 spaces; 
directory names are preceded by "*". 



Local Switches: 

mm-dd-yy/A Load only files created this date or after. 
-Arguments mm and dd can be one or 

two digits. 

mm-dd-yy/B Load only files created before this date. 
name/N Don't load files that match name. 

Template Characters: 

Permitted only when the filename argument is not in a 
directory in the dump file. 

Examples: 

LOAD/VMT0:1) 

Load onto disk all previously dumped nonpermanent 
files on file 1 of the tape on MTO; verify names loaded. 

LOAD/V SPTR -.SV} 

LOAD SPTR, STRIKE ANY KEY. 

EDITS V 

ASA4.SV 



Load all nonpermanent files with the extension. .SV 
and list the files loaded. 

LOAD/L/A MT1 :6 -.SV 1 2-1 5-76/A TEST -.SV/N) 

Load from file 6 of the tape on MT1 all files with the .SV 
extension except those files whose names begin with 

the characters TEST, and any files created before 
December 15, 1976; list them on the line printer. 

DIR D20) 

R 

LOAD/V/R DP4;770722.DU -.SR} 

Load (into directory DZO) all .SR files from dumpfile 
770722.DU. on DP4. (See DUMP command example.) 
If any file to be loaded has the same name as a file in 
DZO. check the files' creation dates. Do not load the file 
unless the dumped version is newer. 



4-44 



093-000109-01 



Licensed Material - Property of Data General Corporation 

LOG 

Start recording in the log file 

Format: 

LOG fpasswordi fdireaory/Oj 

The log file records CLI dialog that appears on the 
console in a file named LOG. CM (FLOG CM for a 
foreground CLI). The CLI creates the ioe file if it 
doesn't exist, then records each line of CLI dialoe in it 
Only one current log file may exist at a time in anv 
ground. 

You cannot examine, print, or delete the log file while 
11 is open. You can close it with the ^ENDLOG 
command (RELEASing the master device or giving the 
BOOT command also closes it). Unless it is deleted" the 
log file will retain all information; when the system is 
rebootstrapped, it will continue recording dialog when 
you type LOG again. 

You can use a password to prevent the log file from 
bemg closed inadvertently. The password is an optional 
argument of up to 10 alphanumeric characters. If you 
specify password, you must use the same password in 
the ENDLOG command to close LOG. CM. 

The directory argument indicates a destination for the 
log file other than the current directory. You must 
mttialize the directory before using its name. 

Global Switches: 



I^taGoieml 

SOFTWARE DOCUMENTATION 



/H 



/T 



Place a header at the beginning of the log 
file. This header consists of the title - 
LOG FILE, directory, and date 
information. 

Trace the execution of CLI commands. 
This tells the CLI to write each 
command in its final form to the log file 
before executing it. All trace lines will be 
preceded by the symbols = = > when 
LOG. CM is printed. 



Examples: 

LOG/HGSTONE) 

Record all CLI dialog to file LOG.CM in the current 
directory. The password is GSTONE. and on output, the 
header of this file will look like: 

—LOGFILE— GATE /Z)PO;SKS/ 12/1 7/77 3:0:0 
GATE is the name of the current directory. 

Assume that you have built a macro file named 
LAST.MC, which contains the following commands: 

DIR %LDIR%;MESSAGE NOW IN DIRECTORY %GDIR% 

Assume also that the value of %LDIR% is DPOF. 

If you opened the log file with the elobal /T switch and 
type: 

LAST) 

the system would write the following lines into the log 
file: 

LAST 

= = > LAST 

= = > DIR DPOF 

= = > MESSAGE NO WIN DIRECTOR Y DPOF 

NOW IN DIRECTOR Y DPOF 

R 

If you had opened the log file wnhout II, these lines 
would appear in the log file: 

LAST 

NO W IN DIRECTOR Y DPOF 

R 



Local Switch: 

name/0 Write the log file in directory name. 



093-000109-01 



4-45 



LOG 



EfetaGoieral 

SOFTWARE DOCUMENTATION 

MAC 

Assemble source files with the 
Macroassembler to produce a relocatable 
binary (.RB) file. 



Format: 

MAC filenamei [...JJIename„J 

MAC is a macroassembler, which assembles 
assembly-language source files into a relocatable binary 
file. Unless you include switches, MAC produces a 
binary file named filename.RBi and no listing file. To 
process MAC's output into a save file, use the RLDR 
command. 

If you want to use MAC from another directory, create 
a link entry to three files: MAC.SV, MACXR.'SV, and 
MAC.PS. 

NOTE: If you receive many undefined symbol 
messages from MAC, try creating a new 
MAC.PS file. This is easy to do; see Chapter 6 
of the Macroassembler User 's Manual. 

Global Switches: 



Licensed Material - Property of Data General Corporation 



/A 



/E 



/F 



/K 



/L 



/M 



/N 



Add semipermanent symbols (defined 
by pseudo-ops) to the assembler 
cross-reference listing (used with global 
or local /L). 

Suppress error messages on the console 
(unless there is no listing file). 

Generate an extra form feed as 
necessary after each listing page to 
produce an even number of listing pages. 
By default, MAC generates one form 
feed after listing each filename. 

Keep M.AC.ST after the assembly. By 
default, .MAC.ST is deleted at that lime. 

.Append an assembly listing to disk file 
filename. LS I. creating the file if 
necessary. 

Flag muliiply-defined symbols on pass 
one. 

Do not build a relocatable binary file 
(useful for checking assembly errors). 



/O 



/S 



/T 



/U 



/2 



Override all listing suppression controls 

(as specified with .NOLOC, .NOMAC, 
etc.). 

Skip pass two and copy MAC.ST (symbol 
table and macro definitions) to file 
MAC.PS. Delete the old MAC.PS (if 
any) first. 

Recognize and store eight-character 
symbols from the source file(s). 
(Cross-reference will show 

five-character symbols.) Normally, 
MAC recognizes and stores only the first 
five characters of symbol names. The 
binary produced is in extended .RB 
format. For restrictions on use of this 
switch, see Chapter 6 of the 
Macroassembler User 's Manual. 

Include user symbols in the relocatable 
binary output. 

For DGC personnel: include DGC 
proprietary heading at the top of each 
listing page. 



Local Switches; 



Give relocatable binary 
(overrides global /N). 



file this name 



name/B 

name/E 
name/L 

name/S 

name/T 

Extensions: 

The CLI always searches for filename with the .SR 
extension; if not found, ii searches for filename. The 
relocatable binary file is always named filename. RB,, 
unless you give another name with local /B, append 
local /S to filename.RBi. or use the .RB pseudo-op. The 
disk file produced by global /L is always named 
filename.LS,, unless you append local /S to filenamei . 



Send error messages to file name. 

Send listing and cross-reference to file 
name (overrides global /L). 

Skip file name on pass two of assembly. 
Use this switch only if name contains no 
storage words. Macro definition files can 
be skipped on pass two. 

Use file name as permanent symbol file 
for this assembly. If you omit this switch, 

the assembler uses file M.AC. PS. 



4-46 



093-000109-01 



Licensed Material - Property of Data General Corporation 

Error Codes: 

If a line of source code contains an error, the assembler 
places a letter at the left margin of the offending line in 
the listing. It can insert no more than three codes per 
line. 



Code 



Meaning 



Addressing error. 

Bad character. 

Macro error. 

Radix error. 

Equivalence error. 

Format error. 

Global symbol error. 

Parity error (input). 

Conditional assembly error. 

Location counter error. 

Multiply-defined symbol error. 

Number error. 

Field overflow or stack error. 

Phase error. 

Questionable line error. 

Relocation error. 

Undefined symbol error. 

Variable symbol error. 

Text error. 



Examples: 

MAC/L2) 

Assemble source file Z.SR or Z, producing relocatable 
binary file Z.RB; send listing to file Z.LS. 

MACLIB/SABCSLPT/L) 

Assemble files A.SR or A, B.SR or B, and C.SR or C, 
producing A.RB. Scan file LIB (or LIB.SR ) on pass one 
for macro definitions and values for externals in A, B, 
and C. Send a listing to the line printer. 

MAC/L/UEX<1 2 3 4>) 

Assemble EXI , EX2. EX3, and EX4 (with or without .SR 
extensions), producing EXl.RB. Include user symbols 
in EXLRB; send a listing to EXLLS. (See Chapter 3 for 
an explanation of angle brackets.) 



I^taGenoBl 

SOFTWARE DOCUMENTATION 

MCABOOT 

Boot an operating system under the other 
CPU via an MCA line (RDOS). 



Format: 

(yCATrn 

MCABOOT/F < 

(MCAT1:n 



MCAT:n 



MCABOOT 



(sysname/S) 
Xprogram/S ) 



(sysname/S 



[filename... J 



MCAT1 :n j If^program/S j 



The MCABOOT command can transmit an operating 
system or executable program via an MCA line. The 
commiand is most useful when the receiving CPU's 
disk has no RDOS system or an inappropriate RDOS 
system (if the receiver's disk had a system, it could be 
bootstrapped conventionally). 

Read the formats as follows: 

MOAT Multiprocessor communications adapter 

transmitter. 

n MCA receiver (range 1-15). 

sysname/S System you want to transmit (you can 
omit this to transmit a system named 
SYS). 

program/S Any program which BOOT can execute 
(see BOOT command). 

filename A file(s) that you want to send along 

with the system or program (no directory 
specifiers allowed). 

For a successful transmission, you must follow the 

order of arguments shown in the formats. 

Use the first format only when the receiving CPU's 
disk is new, or holds valueless material; the /F switch 
specifies full initialization, which destroys all existing 
files on the disk. If you specify /F, the CLI save and 
overlay files will be sent along with any other filenames 
you enter; the receiving CPU will write all these to its 
disk after the full initialization. 

Use the second format when the receiver's disk holds 
useful data. It performs a partial initialization with 
overlays, and does not send the CLI files. You can 
transmit only one sysname or executable program in the 
second format. 



093-000109-01 



4-47 



MCABOOT 



E^taGaieral 

SOFTWARE DOCUMENTATION 

MCABOOT (continued) 



For the transmission to succeed, both the sending and 
receiving CPUs must participate. From the time you 
issue the MCABOOT command, about 11 minutes can 
pass before the sending CPU times out (the default 
period is 655 seconds). During this time, or before you 
issue the command, the receiving CPU must request 
the transmission (the receiver can wait indefinitely). 
The operator at the receiving CPU requests a 
transmission by entering lOOOOTg (for network MCA) 
or 1000478 (for network MCAl), in the data switches, 
pressing RESET, then PROGRAM LOAD. 

At transmission, if you specified an operating system, 
the MCA bootstrap will be sent, followed by the system 
save and overlay files. If you specify /F, CLI.SV and 
CLI.OL will also be sent, followed by the optional 
filenames. After the files have been transmitted, the 
system will request date and lime information at the 
receiver's console, as in a traditional bootstrap. The 
CLI will then gain control at the receiving CPU. 

If you have transmitted an executable program, it will 
gain control at the receiver. 



Licensed Material - Property of Data General Corporation 

Examples: 

MCAB00T/FMCAT:2) 

This command fully initializes the disk of CPU2, and 
sends the default operating system, SYS.SV/SYS.OL, 
to CPU2. Because full initialization was specified, 
CLI.SV and CLI.OL are also sent. CPU2 then writes 
the files to its disk, and requests log-on information on 
its console. 

MCABOOT/F MCAT:2 FORT.SV FIV.SV FORT.LB) 

This command transmits the default system 
(SYS.SV/SYS.OL) to CPU2 in the MCA system", with 
full initialization. The transmitting CPU, attached to 
the first MCA system, sends the FORTRAN IV 
compiler (FORT.SV and FIV.SV) and the FORTRAN IV 
runtime library. CPU2 also receives the CLI save and ■ 
overlay files. 

MCABOOT MCAT1 :3 32K.SV/S) 

This command transmits an operating system named 
32K.SV, and its associated overlay file', 32K.OL, to 
CPU3, for a partial initialization with overlays. Both the 
transmitter and the receiver are attached to the second 
MCA system. 



Global Switch: 

^^ Perform a full initialization on the 

receiver's disk (partial initialization with 
overlays is performed if you omit this 
switch). 

Local Switch: 

name/S Send a system (or program) name (other 

^han the default system 

(SYS.SV/SYS.OL)). You can omit the 
.SV extension. 



4-48 



093-000109-01 



Licensed Material - Property of Data General Corporation 

MDIR 

Display the master directory name 

Format: 

MDIR 

Prim the name of the master directory on the console 
This directory contains the system save and overlay 
files, plus push space for program swaps: for RDOS i't 
also contains the spool files and tuning file (if any). 

Switches: 

None. 



Example: 

MDIR) 

DPOF 

RELEASE %MDIR%} 

MASTER DEVICE RELEASED 



I^laGeneral 

SOFTWARE DOCUME.MTATION 

MEDIT 

Invoke the Multiuser Text Editor (RDOS) 



Format: 

MEDIT terminals [clock-untis] 

MEDIT allows several users to edit text at the same 
time. Each user is served as though he were the only 
one, except for a possible slight degradation in response 
tirrie. See the Tex! Editor User's Manual for more 
mformation. 

terminals sets the maximum number (decimal) of 
text-editing terminals for .MEDIT to 
support. If you specify 8, for e.xample, the 

system will support terminals 0-7. 

cbck-imns represents the number of svstem 
clock-units; it is optional. After this number 
of units has passed, task rescheduling will 
be forced. 



Switches: 

None. 



Example: 

MEDIT 6) 
R 



CTRL-C 
R 



MEDIT is ready to accept commands 
on six terminals. 

Users issue editing commands. 

Recognized from master console 
only. 



093-000109-01 



4-49 



MEDIT 



IMaGeneral 

SOFTWARE DOCUMENTATION 

MESSAGE 

Insert a text string for later display 



Format: 

MESSAGE /"itextstring/"/. . . [textstring] ["] 

After you enter your textstring, CLI displays your 

message on the console. A global switch allows you to 
delay further execution of the command line until 
someone strikes a console key. 

This command is very useful for sequences of 
commands. 

You can enter the textstring inside quotes (e.g., 
"HELLO" ), or omit quotes. If you use quotes, the 
MESSAGE command will return all characters literally, 
except for the quotes (which are textstring delimiters'), 
and any semicolons, carriage returns, and form feeds 
(which are command delimiters). A single quote within 
a quoted string is illegal. The textstring cannot include 
more than 72 characters. 

If you omit quotes, the CLI will try to interpret certain 
characters if they are part of the string (e.g., %GDIR%, 
©TEST®). You cannot make angle brackets ( < > )' 
parentheses ( ), commas, or slashes (/) part of an 
unquoted string. Unquoted textstring delimiters are 
command delimiters; e.g., }, a semicolon (followed by 
another command), etc. The textstring cannot include 
more than 132 characters. 

Global Switch: 



Licensed Material - Property of Data General Corporation 

Examples: 

XFER/A $TTI LOGON. MC) 

DIRUSERSDISK;CHATRSYS.<SVOL>) +W-^P!1 
CHATRCLL<SVOLER> +W + P) ' 

MESSAGE WELCOME ABOARD. USER DIRECTORIES) 
MESSAGE AVAILABLE ARE: ; LIST - DR) 

CTRL-Z ' 

R 

Program LOGON would display the MESSAGE text 
and obey the other commands: 

LOGON) 

WELCOME ABOARD. USER DIRECTORIES 
A VAILABLEARE: 
SECONDPART.DR 507904 CTY 

SUBDIR.DR512 DY 

SUBDIRA.DR512 DY 



/P 



Pause after displaying textstring. display 
the message STRIKE ANY KEY TO 
CONTINUE, and wail for someone to 
strike a key on the console. 



You could build file ALLDONE the same way, and use 
the /P switch to delay execution until someone pressed 
a key: 

XFER/A STTI ALLDONE.MC) 

CHATRSYS.<SVOL> -W-P CLI.<SV 0L> -W-P) 
MESSAGE THE CURRENT DIRECTORY IS %GDIR%-) 
MESSAGE MOUNT DUMP TAPE ON MTO AND READY) 
MESSAGE DRIVE;} ^ 

MESSAGE THE TIME IS %TIME% ON %DATE%-) 
MESSAGE/P ENJOY.) 
INIT MTO; DUMP/V MTO:0} 
CTRL-Z 
R 



Local Switches: 

None. 



4-50 



093-000109-01 



Licensed Material - Property of Data General Corporation 

MKABS 

Make an absolute binary file from a disk 
save file 



DataGeneral 

SOFTWARE DOCUMENTATION 



Extensions: 



The CLI searches for savefilename.SV; if it does not 
find ii, it searches for savefilename. 



Format: 

MKABS savefilename absolute-filename 

Use MKABS to make an absolute binary file from a 

memory image (save) file. 

After you convert an executable program into an 
absolute binary, you can execute it without a disk, via 
the binary loader. 

Global Switches: 



/s 



/2 



Starting address switch. The starting 
address of the save file as specified in 
USTSA of the nie will be used as the 
address for the absolute binary start 
block. Default is a null start block which 
halts the binary loader when loading is 
completed. 

Begin save file at memory location zero; 
default is 16g. This configures the file as 
a stand-alone program, which you 
cannot execute under RDOS, but which 
can execute by itself. (See RLDR global 
switch /Z.) 



Examples: 

MKABS/ZFOOSPTP) 

Punch an absolute binary file on the paper tape punch 
from file FOO.SV or, if not found, from FOO. 

MKABS/Z A SPTP 1 0OO/S) 

Punch an absolute binary file with a start block that 
specifies lOOOsas the starting address. 

MKABS/Z SFIVE.SV SFILEABS.SV) 

Make absolute disk file SFILEABS.SV from disk file 
SFIVE.SV. 



Local Switches: 



n/F 



n/S 



n/T 



n is the first address, relative to save file 
location 0, from which the absolute 
binary file is to be created. 

n is the starling address. The absolute 
binary start block will have the address 
specified by the octal number that 
precedes this switch. 

n is the last address, relative to save file 
location 0, to become a part of the 

absolute binary file. 



093-000109-01 



4-51 



MKABS 



DataGeneral 

SOFTWARE DOCUMENTATION 

MKSAVE 

Make a disk save file from an absolute 
binary file 



Format: 

MKSAVE absolute-filename savefilename 

Use MKSAVE to create a memory image (save) file 
from an absolute binary file. The disk file will 
automatically be given the S attribute. The system 
appends the .SV extension to your specified 
savefilename. 



Global Switch: 



/z 



Start save file at memory location zero 
rather than 16g. Caution: See RLDR 
global /Z. 



Example: 

DIRDPO) 

MKSAVE/Z SPTR DPI :A) 

Make a disk save file called A.SV. in DPI from the 
absolute binary file loaded in the paper tape reader 
A.SV begins at memory location zero; vou can execute 
It by typing BOOT DPO). and responding to the 
FILENAME? query with A.SV/A). 



Licensed Material . Property of Data General Corporation 

MOVE 

Copy files from the current directory to 
any directory 



Format: 

MOVE destination-directoryname [filename, ...] 

Copy one or more files (filenames) from the current 
directory to a destination-directory. As with DUMP 
the directory information for each file is preserved - 
name, length, attributes, creation and last access time. 

The destination-directory can be a partition or 
suMimcioTy-fdenamemusi be a filename in the current 
directory. You cannot MOVE a directory. If vou omit 
filenames and switches, all nonpermanent files in the 
current directory are moved. 

DOS users: If you copy a file with MOVE from a 
write-protected diskette, the copy auiomaticallv 
receives the attributes APW, which means that vou can 
never delete or modify the copy. 

Global Switches: 

/A Move all files, including permanent files. 

/D Delete original files after copying them. 

/K Do not move links. 



/L 



/R 



/v 



List moved filenames on the line printer 
(overrides /V switch). 

Move most recent version of the file. 
When a file to be moved has the same 
name as a file in destination-directory 
the system checks both files' creation 
dates. If the file in destination-directory 
IS older, it is deleted and filename 
replaces it. Otherwise, it is not moved. 

Verify the move by listing the names of 
the moved files on the console. 



4-52 



093-000109-01 



Licensed Material - Property of Data General Corporation 



Local Switches: 

mm-dd-yy/A 



mm-dd-yy/B 



name/N 



Move any file created this date 
or after. Arguments mm 
(month) and dd (day) may be 
one or two digits. 

Move any file created before 
this date. 

Do not move files that match 
name. 



oldname/S newname Assign newname to the 
preceding file (but retain its 
oldname in the current 
directory). 



Template Characters: 

Permitted. 

Examples: 

M0VE/VDP1 TEXT-.-} 

Copy all nonpermanent files in the current directory 
which begin with the letters TEXT to directory DPl' 
Verify moved files on the console. 

MOVE/D/K/V SOURCE -.SR PROG-.-/N) 

Copy all nonpermanent files in the current directory 
(except link entries and files beginning with PROG ) to 
directory SOURCE. Verify moved files on the console 
and delete the original files after the move. 

DIRACCTSDUE) 
R 

MOVE/A/V/R DZOrLEGALNOTES -.AD 1-2-77/B) 

ADRIANCO.AD 

JOHNSMART.AD 



I^taGeneBl 

SOFTWARE DOCUMENTATION 



NSPEED 

Invoke the NOVA Supereditor 

Format: 

NSPEED l/llenamej 

Edit ASCII text on a NOVA computer. Superedit 
features multibuffer editing, multiple I/O files, 
macroprogramming, and numeric variables. If the 
filename does not exist, Superedit creates it; if it does 
exist, Superedit opens it. For ECLIPSEs, see SPEED 



To use Superedit from another directory, you must 
to both of its files; these are NSPEED SV 
SPEED. ER. 



link 
and 



For more information, see the Superedh User's Manual. 

Switches: 

None. 



Example: 

NSPEED FILEX) 
CREATING NEW FILE 



iUESS 
!HSS 



Superedit creates and 
opens FILEX. 

! is the Superedit prompt. 

Enter editing commands 

Update the file. 
The H ESC ESC 
command terminates 

Superedit and returns 
control to the CLI. 



This example assumes that bills are filed in directory 
ACCTSDUE. As each bill file is created in ACCTSDUE, it 
receives the extension .AD (account due). The MOVE 
command moves all bill files created before January 2, 
1977, into directory LEGALNOTES on unit DZO, and 
verifies moved files on the console. 



093-000109-01 



4-53 



NSPEED 



I^taGeieral 

SOFTWARE DOCUMENTATION 

OEDIT 

Edit octal locations in a disk file 



Format: 

OEDIT filename 

Invoke the octal editor to examine and modify in octal, 
decimal, or ASCII any location in any disk file. The 
symbolic editor (see SEDIT) offers slightly more 
versatility than OEDIT. For details on OEDIT, see the 
Octal Editor User s Manual. 

Switches: 

None.^ 

Extensions: 

The octal editor searches for whatever filename and 
extension are given. 



Examples: 

OEDIT FOO.SV) 



14/007672 

S2 
R 



If OEDIT finds FOO.SV. it 
opens it, then types a 
period (.) prompt. 



Proceed with editing. 



To return to the CLI, type 
ESC 2 (echoed as S2). ' 



You can find the current NMAX requirement for any 
save file by issuing the OEDIT command: 

404-16/ rmnnnn 

and find the ZM AX value by entering: 

401-16/rrrr" 

The values nnnnnn and rrrrrr are returned by OEDIT, 

and indicate filename's current NMAX and ZMAX 
requirements. 



Licensed Material - Property of Data General Corporation 

OVLDR 

Create an overlay replacement file 
(RDOS) 



Format: 

OVLDR savefilename old-ovly-descrip/N| 
new-ovly-name(s)l) 
old-ovly-descrip/N new ovlyname(s) 

This command creates and loads an overlay 
replacement file for the overlays of a program which 
was loaded (RLDR) with overlays. It can replace up to 
127 overlays. The new overlays will not replace the old 
ones until you issue the REPLACE command. 

old-ovly-descrip describes the overlay which will be 
replaced by new-ovly-name(s). This can be either the 
octal representation of the overlay segment and overlay 
number within the segment, or it can be the symbolic 

^^t^^X "^"^ " '^ ^^^ "^"^^ ""'^^ assigned with the 
.ENTO pseudo-op in the root program. 

See Chapter 4 of the RDOS Reference Manual or the 
Extended Relocatable Loaders Manual for more on 
overlays. 

OVLDR requires a symbol table in savefilename; 
RLDR will do this only if you specify the global/D 
switch, or include a .EXTN .SYM. in a program 
module. 

Global Switches: 



/A 



/E 



/H 



Produce an additional symbol table 
listing with symbols ordered 
alphabetically. You must also append the 
local /L switch. 

Display error messages on the console 
when a listing file has been specified 
(local/L). By default, when you specify a 
listing file, error messages to the console 

are suppressed. 

Prim all numeric output in hexadecimal 
(radix 16). By default, output is in octal. 



4-54 



093-000109-01 



Licensed Material - Property of Data General Corporation 

Local Switches: 

name/E Send error messages to file name. 

name/L List the symbol table on file name. The 

labie lists symbols in numeric order. 

old-ovly/N Old overlay descriptor precedes this 
switch, and new overlay relocatable 
binary name(s) follow. 

Examples: 

OVLDR/A/E ROOT OLDO/N NEWO NEW1 f ) 
ROOT.OM/L) 

This command line creates overlay replacement file 
ROOT.OR. When ROOT.OR replaces the original 
overlay file, ROOT.OL. overlays NEWO and NEW1 will 
replace old overlay, OLDO. in ROOT's overlay file. The 
.ENTO pseudo-op was used in each overlay; thus we 
could reference overlays by name instead of by overlay 
number and node number. OVLDR's error messages 
and memory map of new symbols will be written to disk 
file ROOT.OM. Error messages will also go to the 
console. 

The RLDR line which loaded ROOT might have looked 
something like this: 

RLDR/D ROOT [OLDO.OLDI] |} 
R00T1 [OLD2,OLD3l} 



EktaGeieral 

SOFTWARE DOCUMENTATION 

PATCH 

Install patches in a save or overlay file 



Format: 

PATCH [saveJllenamelS] [paichfilenamelP] \) 
[toadmap-filenamelLj 

The PATCH utility installs patches which you inserted 
in a patchfile with the ENPAT utility. To apply Data 
General-supplied patches to an operating system, you 
must have instructed SYSGEN to save a load map file. 
If no load map exists for a program, you can patch it by 
appending the global /N switch to PATCH (although 
you won't be able to use symbols in the patchfile). If 
you omit arguments, PATCH will ask for them. 

When PATCH runs, it creates a patch dialog file named 
savefilename.PD. deleting any file of the same name 
first. This file records patch date, time, and locations 
for the last patch of savefilename. Patches applied 
during the last run of PATCH are marked with an 
asterisk (*) in the dialog file. You can TYPE this file at 
will. 

Patch error messages are explained in Appendix A. 

Global Switches: 

/I 



m 



Do not display comments from the 
patchfile on the console. 

There is no load map available. 



Local Switches: 

name/L name is the load map filename. You 

must include the extension to this name. 

name/P name is the patchfilename, including 

extension (created by ENPAT). 

name/S Apply the patch file to program name. 

You can omit the .SV extension. 



093-000109-01 



4-55 



PATCH 



DataGeneral 

SOFTWARE DOCUMENTATION 

PATCH (continued) 



Examples: 

PATCH SYS/S SYS.LM/L IPB/P) 

3 APPLICABLE PA TCH(ES) 

3 PATCH(ES) NEEDED TO BE INSTALLED 

H 

This command installs the patches entered in the 

ENPAT example. Note that PATCH described h^ 

i™ns' °^ '^^''''^'' ''''^''' '"^ the number ^ 

PATCH/N MYPROG/S MYPROG Pl/p) 

2 APPLICABLE PA TCH(ES) 

2 PATCH(ES) NEEDED TO BE INSTALLED 

H 

Here, the patches inserted in patchfile MYPROG Pi are 
applied to user program MYPROG. There is no load 
map, hence the global /N switch. (Eventually for 
permanence, MYPROG's author should make 
corrections to the source version, then reassemble and 
reload it.) 



Licensed Material - Property «# n , ^ 

H^i^y of Data General Corporation 

POP (^ 

Return to the npv* w i . 

"«xt higher level program 

Format: 

POP 



When a user program ha? c»,„ , , i 

two or below, PO? fc J. T '" '^^ ^^^ °" ^' 
execution of the user proJ;l*p ^^^'^"^ ^° '''""'" 
the CLI via system call EXFr "q T^""' "'"r^f ^ . 
example, or .EXEC in your ^v J'' ^T"^'' ^ ^°' '1 
for details on .EXEC. '^''^"^ ^^^^'"^"^^ "^^""'^ 

The CLI is initially on Immi 

another program via the CLI t^^T^'" ^'°" f" f r 
memory and the new nrL ^ ^" '^ ^^^PP"^ °"^ °J 
executed on level one The f^ '' ^'°"^^^ '"-'fr 
out and th- rr T kIJ u "®^ program swaps itself 

You cannot POP from the level zero CLI. 

Switches: 

None. 

Examples: 

f^^.!;!fl'/-r^' ^'°^''"' '"""^"8 at level one, wishes 
to suspend ,ts operation temporarily so that it can ask 

fnLr.^n TH ^v^^Jf. '°"^^ '"^^tine maintenance 

one Z Th " ^^^^-^^ .^^^^^^ t° ^es""^^ its own 
operation. Thus a return (via CTRL-A or any other 

TnTAni'""" r' '''' ^" would be inadequate, 
since XCLI could not resume; it would have to begin 
agam. To use the CLI temporarily, XCLI swaps in the 
CL on eve two vm system call .EXEC. After using the 
CLI at level two to perform whatever functions were 
needed, the operator issues the POP command. This 
restores XCLI m mam memory; it continues from the 
pomi of mierruption. Appendix D shows an assembled 
version of XCLI. 



V 



4-56 



093-000109-01 



Licensed Material - Property of Data General Corporation 

PRINT 

Print an ASCII file on the line printer 

Format: 

PRINT filenamei [...filename^ ] 

Copy Che conienis of ASCII filename (s) on the line 
printer (SLPT). PRINT is the equivalent of a series of 
XFER/A filename SLPT commands. To prim a binarv 

file, use FPRINT. 

The nienameCs) may be on any device. If the system 
detects a parity error on paper tape, it prints a left slash 
(\) in place of the bad character, and displays the 
message PARITY ERROR on the console; printing 
continues. 

Switches: 

None. 

Examples: 

PRINT FOO.SR DPOF.-COM.SR EXT.SR) 

Print source files FOO.SR. COM.SR on DPOF, and 
EXT.SR on the line printer. 

PRINT ARREARS: < JAN.FEB. MAR >.BL} 

Print files JAN.BL. FEB.BL, and MAR.BL in directory 

ARREARS. 

PRINT DPI :MYFILE/2} 

Print MYFILE. which is on the primary partition of DPI , 

twice. 



DataGeneral 

SOFTWARE DOCUMENTATION 

PUNCH 

Copy an ASCII file on the paper tape 
punch 



Format: 

PUNCH filename, [...fdenamej 

Copy the contents of ASCII filename (s) to paper tape 
on the high-speed punch (SPTP). PUNCH is the 
equivalent of a series of XFER/A filename SPTP 
commands. To punch a binary file, use BPUNCH. 

The filename (s) may be on any device. If the system 
detects a parity error on paper tape, it punches'a left 
slash (\) in place of the bad character, and displays the 
message PARITY ERROR on the console; punching 
continues. 

Switches: 

None. 

Example: 

PUNCH DPO:ALPHA.SR BETA.SR) 

Punch files ALPHA.SR and BETA.SR on the high-speed 
punch. 



093-000109-01 



4-57 



PUNCH 



SOFTWARE DOCUMENTATION 

RDOSSORT 

Invoke the RDOS Sort/Merge Program 
(RDOS) 



Format: 

RDOSSORT inputfilenamei [inputfilename„] 
[omputfilenamelO] key i [key„ ] [arguments] 

Use the RDOSSORT command to invoke the 
Sort/Merge Program, which can rearrange, delete, 
and/or combine disk or tape files. The RDOS 
Sort/Merge Manual covers this utility. You can run 
Sort/Merge from the console or under BATCH, on a 
mapped machine, or in the background of an 
unmapped machine. The Sort function reads records 
from an input file (inputfilename) and sorts them 
according to the key specifications, switches and 
arguments you specify in the command line. If you 
want a sorted output file, this input file must be 
disk-resident. 

In Merge mode, the program reads records from up to 
six disk or tape input files and produces a single output 
file. Use the global /M switch to select the Merge 
function. 

In the format, inputfilename is the name of a disk or 
tape file. If you omit ompmfilenamelO, there will be no 
output file; this is useful if you want only a key file or 
listing. The data in inputfilename will be sorted 
according to the key you specify; up to eight keys are 
permitted. These keys make up the Control Word, 
which will be compared to the field in each input 
record. You specify each key as: b.f, where b is the 
starting character number, and f is the character field 
length. For example, 7.10 specifies a lO-characier key 
in character positions 7- 1 6 of the record. 

In the argumenis pon'ion of the command line, you can 
specify the following parameters: 

record size -Iht program assumes that the input records 
are 80 characters (bytes) long, the length of a normal 
console line. If your records are noi 80 characters, enter 
their decimal byielengih followed by the local /R 
switch. 

input file collating order - By default, records are collated 
in ascending .A.SCII sequence (by ascending byie 
number). You can reverse this by appending the global 
/D switch, or specify your own collating order by 
appending local /S to the filename which describes your 
sequence. 



Licensed Material - Property of Data General Corporation 

input file field deUmiters - To specify a lower limit, append 
local /B to the file containing the lower limit for the 
major key field; for an upper limit, append /U to the 
filename containing the upper limit. If you omit either 
delimiter, all records input will be output. 

output fields - You can specify from one through eight 
output fields, which will determine the format of 
records in the output file. You specify an output field as 
you do a key, except that a colon replaces the period 
{b:f). If you enter no output field specifier, each record 
will be output in the same form as you input it. 

output fles - You specify the listing file with local /L; 
default is the console. Unless you specify a file for 
sorted keys with /K, no key file will be produced. 

work fles - During a sort operation, the Sort/Merge 
program uses up to six work files. It creates these in the 
current directory, and names them SORTWn.TP. 
where n is 1 through 6. In many sorts, work file 1 is 
most active, followed by 4, 2, 5, 3, and 6. If you want 
greater sorting efficiency, you can arrange the work, 
input, and output files on different devices, according 
to priority. Use the local /W switch to specify an 
alternate work file. See the Sort/Merge User's Manual for 
more information. 

Global Switches: 



/D 



/M 



/N 



Sort records in decending ASCII order 
(default is ascending). 

Merge record (the default operation is 
Sort). 

Do not list son or merge statistics (by 
default, Son/Merge lists statistics). 



Local Switches: 

name/B File name contains the lower limit field. 

name/D In Sort mode, delete inputfile name after 

sorting it. The system ignores this switch 
if you specify no output file. 

name/K .After sorting keys, write them to file 

name. 

name/L List son output on file name (overrides 

global /K). 

name/0 name is the sorted or merged output file. 



4-58 



093-000109-01 



Licensed Material - Property of Data General Corporation 

n/R 



Decimal number n is the input record 
size (in bytes) (default is 80). 

File name specifies the collating 
sequence (default is ascending ASCII). 

File name contains the upper limit field. 

File name is a user-defined work file. 
You can specify up to six work files. 



name/S 

name/U 
name/W 

Example: 

RDOSSORT MEMBERS. DA DGSORT/0|} 
COLLAT/'S61.12 141.10 SLPT/L 180/Rf} 
1 ;30 61 ;60 1 21 :30 BOTLIMIT/B TOPLiMIT/U) 

The summary of statistics for this command might be: 



RDOS Son/Merge 
Program 

Input Filename(s) 
Output Filename 
Record Size (Bytes) :- 180 
Collating Sequence 
Sequence Filename 
Sorted Key Filename 
Lower Limit Filename 
Upper Limit Filename 
Input Field Specifiers 



Output Field Specifiers 



Input File Records 
Son In Record Count 
Sort Out Record Count 



06:43:07 07/02/76 

Son mode 
-MEMBERS. DA 
- DGSORT 

- User Specified 
-COLLAT 

- None Specified 

- BOTLIMIT 
-TOPLIMIT 

Start Bvte/Length 
(Bvtes) 
61-12 
141-10 

:- Start Byte/Length 
(Bvtes) 
1-30 
61-60 
121-30 
:-3458 
:-3458 
:-366 



E^taGenoBl 

SOFTWARE CXKUMENTATION 

RELEASE 

Release a directory or tape drive from the 
system 



Format: 

(tape drivel 

RELEASE < > 

I directory J 

Logically remove a tape drive or directory from the 
system. When you RELEASE a mag tape unit, the tape 
is automatically rewound. After release, a directory or 
device is closed to access until you initialize it with an 
INIT or DIR command. Be sure to release a disk before 
physically removing it. Releasing a directory releases all 
subordinate directories. 

To shut down the system, release the master directory; 
this releases all initialized devices in the system, 
including tape transports. After you have released the 
master directory, the message MASTER DEVICE 
RELEASED will appear on the console. If a foreground 
program is running in RDOS, you must type CTRL-F 
on the background console before releasing the master 
device - you cannot release it from the foreground. 



Switches: 

None. 

Examples: 

RELEASE DP1} 

Release DPI and all its directories and permit the disk 
to be removed from drive 1. DPI was not the master 
device. 

RELEASE MTO) 

Rewind and release MTO. 

RELEASE %MDIR%) 

MASTER DEVICE RELEASED 

Shut down the system. The CLI variable %MDIR% 
contains the name of the master dirctory. 



093-000109-01 



4-59 



RELEASE 



DataGeneral 

SOFTWARE DOCUMENTATION 

RENAME 

Rename a file 



Format: 

RENAME oldnamei newnamei f...oldname„ newnamej 

The system allows you to rename any file which has not 
been protected with the P attribute; this includes the 
system utilities. Some utilities use a special COM.CM 
file (Appendix D), and will not work if you rename 
them. No save file can execute without the .SV 
extension. 

Switches: 

None. 

Examples: 

DELETE Q.SV) 
R 

RENAME QTEST.SV Q.SV) 
R 

Replace the old version of Q.SV with a new version, 
which was previously named QTEST.SV. (QTEST.SV 
was a debugged version of Q.SV.) 

RENAME DP0:A1 .DR DPO:A.DR B1 B) 

Rename directory A1 to Aon DPO; rename file 81 to B 
in the current directory. 

XFER/ASTTIA) 
LONGFILENMR 

~ Press CTRL-2 here 
RENAME T @A@.OI T1 @A@.02 T2 @A@ 03) 
R 

This shows an easy way to assign the same name string 

to existing files. The @ signs specify the co/i/e«/s of file 

A: the string LONGFILENM. The old names T. Tl. and 
T2 become LONGFILENM.OI. LONGFILENM 02 ' and 

LONGFILENM. 03. ' * 



Licensed Material - Property of Data General Corporation 

REPLACE 

Replace overlays in an overlay file 
(RDOS) 

Format: 

REPLACE savefilename 

REPLACE is the active sequel to the OVLDR 
command. It replaces overlays in an overlay file named 
savefilename.OLwith the overlays you specified in the 
OVLDR command. Actual replacement will occur as 
soon as there are no outstanding overlay load requests. 

Switches: 

None. 

Example: 

REPLACE ROOT) 

Replace the specified overlays in file ROOT OL with 
new overlays in file ROOT.OR. The OVLDR command 
created the overlay replacement file ROOT.OR. 



4-60 



093-000109-01 



Licensed Material - Property of Data General Corporation 



DataGeneral 

SOFTWARE DOCUMENTATION 



REV 



Display the revision level of a save file 



Format: 

REV savefiiename/.SF/ 

savefitename must have the "S" aiiribuie. The system 
returns the major revision number followed by a period 
and a minor revision number. Both major and minor 
revision levels can be in the range through 99. 

Use the .REV assembler pseudo-op to assign a major 
and minor revision level number to a source file. If you 
omit this pseudo-op from all source programs, then the 
revision level of the save file will be displayed as 
"00.00". 

Certain compilers (e.g., FORT) assign their own 
revision level to the binary Tile; it is then carried over to 
the save file. 

Switches: 

None. 

Example: 

REVCLI) 
CLI.SV06.20 

The major revision level of this CLI is 06, and the 
minor revision level is 20. 



RLDR 

Load relocatable binaries (RBs) 
produce an executable save file 

Format: 

(binaryi ... [library]... 



to 



RLDR 



(root binary, ... [overlay-binary, ...} [library...] 



Invoke the Relocatable Loader utility to load 
relocatable binary files or libraries and produce a save 
file. By default, the save file receives the name of the 
first binary in the command line. %vith the extension 
.SV. If you specify overlays, the RLDR creates an 
overlay file for the save file, and gives it the same 
name, with the extension .OL. 

Consult the Exiended Relocaiable Loaders Manual for 
details on RDLR. 

Use the root-binary formal to create an overlay file for 
your program. RLDR places each root-binary in the .SV 
file, and each overlay-binary in the .OL file. During 
execution, all root-binaries will remain in memory all of 
the time, while the overlay-binaries will be called from 
the .OL file into their assigned memory nodes, 
according to the instructions in your program. 

Each pair of square brackets { [ ] ) defines a node in the 
.SV file and a segment in the .OL file. (Square brackets 
are not notation conventions in RLDR command 
formats.) Nothing resides in the node of the .SV file: 

RLDR simply reserves an area of memory to receive an 
overlay from the node's corresponding .OL file 
segment. Each comma within square brackets delimits 
an overlay. The individual overlays will reside 
independently in the .OL file, yet they will be 
contiguous to one another in the order given in the 
RLDR command line. Overlays assigned to the same 
node (placed within the same pair of brackets) will 
overwrite their node as the executing program loads 
COVLODs) them one-by-one. For example, the 
command line RLDR ABLE [A. B] loads binary ABLE as a 
root program, ABLE.SV; ABLE has one' node for 
binaries A or B. The node in the disk file will maintain 
itself in memory when ROOT executes: ROOT can 
load either A or B into this node without affecting the 
rest of itself. For more on overlays, consult the Loaders 
manual and Chapter 4 of your system reference 
manual. 

To load a program, RLDR uses its own save and 
overlay files (RLDR.SV and RLDR.OL) and the 

system library (SYS. LB). All these files are normallv 
available in the master directory. To use RLDR from 
another directory, you must create links to each of 
these files from the directory. 



093-000109-01 



4-61 



RLDR 



DataGeneral 

SOFTWARE DOCUMENTATION 

RLDR (continued) 



Licensed Material - Property of Data General Corporation 



Note: Because the system library (SYS. LB) differs for 
each type of system (e.g., unmapped NOVA 
and mapped NOVA), a program loaded under 
one type of system will probably not execute 
under another type of system. To load for a 
different kind of system, you must obtain the 
proper system library for the target system and 
ensure that RLDR searches it, not the current 
library, during the load. You can do this by 
loading from a (sub)direciory which holds links 
to RLDR and the target library. 

If you will want to debug the program, use the global 
/D switch; this includes both a debugger and program 
symbol table in the program save file. To include local 
user symbols, also use local /U (you must have 
specified global /V to the assembler or compiler). 

RLDR can also produce a load map (memory map), 
which shows where program modules will reside when 
the program executes. This load map can help you 
patch the save file on disk; you can print it or save it on 
disk with the local /L switch. \ 

If a program will run more than one task, you must 
specify multiple tasks, and the number of I/O channels 
for the program, to RLDR. RLDR will then include the 
multitask scheduler in the program. To specify tasks 
and channels, use either a .COMM T.4SK statement in 
your program, or RLDR local switches /C and /K. If 
you're working in an advanced language (as opposed to 
assembly language), your compiler manual will tell you 
how to specify multiple channels/tasks. 

Global Switches: 



/A 



/B 



/C 



Produce an additional load map, with the 
symbols ordered alphabetically (you 

must also include local /L). 

Use short TCBs in the save file (effective 
in unmapped NOVA multitask programs 
only). 

Load for compatibility with RTOS. Stan 
user NREL code at 440, and the save file 
at (as with local /Z switch); do not 
search SYS. LB unless its name is 
included. 



/D 



/E 



/G 



/H 



/I 



/K 



/M 



/N 



/O 



/P 



/S 



/x 



Include the symbolic debugger and 
program symbol table with the program. 
To load the interrupt-disable debugger, 
include its name (xIDEB.RB) 
somewhere in the command line. The 
program symbol table will not be written 
to the save Be unless you include the /D 
switch. Use global /S with /D to store the 
symbol table in high memory (instead of 
directly above the program). 

Display error messages on the console 
when a listing file has been specified 
(local /L). By default, when you specify a 
listing file, error messages go to it, not'to 
the console. 

When overlays reference named 
common, print a warning message at 
each occurrence. By default, RLDR 
prints a warning message at the first 
occurrence only. 

Print numeric output in hexadecimal 
(radix 16). By default, numbers are 
printed in octal. 

Do not create UST, TCB, or other 
system tables; start NREL code at 445g 
and ZREL code at 50g. The save file 
cannot execute under any Data General 
operating system. 

Store RLDR's internal symbol table for 
this program in file binary. ST. RLDR 

does not save this file unless vou include 
/K. 

Do not display load map or error 
messages on the console. 

Do not search the svstem librarv 
(SYS. LB). By default, rLdR searches 
the system library at the end of the 
command line to try and satisfy 
undefined symbols. 

Do not include program symbol table in 
the save file, even though the debugger 
is.included (used with global /D). 

Print the starting NREL value of each 
RB as it is loaded. 

Leave the symbol table in high memory 
(you must also include /D). 

Used during SYSGEN lo specify system 
over la vs. 



4-62 



093-000109-01 



Licensed Material - Property of Data General Corporation 

/Y See Global X. 



/Z 



Load the save file to start execution at 
location 0. Be careful with the global /Z 
switch; the resulting save file cannot 
execute under RDOS or DOS. Use this 
switch to load stand-alone programs 
which use page zero locations 0-I5g. You 
can then process the save file via 
MKABS/Z to produce an absolute binary 
thai can execute in stand-alone mode', 
via the binary loader. 



Local Switches: 

n/C 



name/E 

n/F 



n/K 



name/L 



n/N 



name/S 



name/U 



.Allot n I/O channels to the program. 
This octal value overrides any value 
specified in a .CO.MM TASK statement. 
If you omit both /C and .COMM TASK, 
RLDR allots eight channels to the 
program. 

Send error messages to file name. 

Start program's NREL address space at 
octal address n. for execution in an 
unmapped RDOS foreground. You must 
also include local /Z. 

Allot octal n tasks to the program. This 
overrides any value in a .COMM TASK 
statement. By default, the RLDR allots 
one task. 

Send the load map to file name. This map 
will list symbols in numeric order. It 
won't be saved unless you include this 
switch. 

Force the NREL pointer, which indicates 
the location for loading the next file, to 
octal address n. Address n must exceed 
the current NREL pointer value. (The 
pointer value is originally 400g plus space 
for a User Status Table, TCBs, etc.; 
RLDR moves it upward as it loads each 
binary.) 

Give the program file name, with the .SV 
extension, and the overlay file name, 
with the -OL extension. 

Include user symbols from binary file 
name in the symbol table. Local symbols 
are those used exclusively within this 
binary. This works only if you specified 
local /U to the assembler. 



[binaries]/V 



n/Z 



E^taGeieral 

SOFTWARE DOCUWENTATION 

Load binaries (delimited by brackets) as 
virtual overlays (mapped RDOS only). 
All virtual overlays must precede other 
overlays in the load command line- e g 
RLDR ROOT 1R1.R2I/VR00T1 [R3.R4r" 

Start program's ZREL address space at 
octal address n. By default, ZREL code 
starts at location 50 n. 



Extensions: 

The CLI searches for each binary with the RB 
extension; if it does not find it, it searches for binary. 
You must include library name extensions, if any. 

Examples: 

RLDR ABCDP4:D) 

Load files A. B. and C from the current directory, and 
file D from DP4; produce save file A.SV in the current 
directory. All messages go to the console. Neither the 
symbol table or the load map are saved. 

RLDR/D ABC) 

Load files A. B. and C with the symbolic debugger to 
produce file A.SV. 

RLDR/E MYFILE MYFILE.LM/L) 

Load MYFILE to produce MYFILE.SV; create listing file 
MYFILE. LM and send the load map and all messages to 
It. Additionally, send error messages to the console. 

RLDR MYPROG PROGi MYLIB.LB SLPT/L 10/K 20/0} 

Load MYPROG, PROGI, and library MYLIB LB to 
produce MYPROG.SV. All RLDR messages (including 
the load map) go to the line printer. MYPROG.SV is a 

multitask program; it can run lOg tasks and use 20g 

channels if it wants. 

RLDR RO [A.B.CD] R1 R2 [E.F G.Hl RO.LM/L) 

Load binaries RO, R1 , and R2 into RO.SV; create overlay 
file RO.OL with two segments. RO.SV can load overlays 
A, B. C, or D into the first node (node 0); it can load 
overlays E, F and G, or H into the second node (node I ) . 
The load map and console messages go to file RO.LM. 



093-000109-01 



4-63 



RLDR 



EtetaC^eral 

SOFTWARE DOCUMENTATION 

SAVE 

Rename the break file 



Licensed Material - Property of Data General Corporation 

SDAY 

Set today's date 



Format: 

SAVE filename 

Rename file BREAK.SV (FBREAK.SV for the 
foreground) to filename.SV. SAVE is commonly used 
to save the core image of a program interrupted by a 
CTRL-C break or by the debugger SV command. If 
filename already exists in the current directory, the 
system deletes it. You cannot precede filename with a 
directory specifier. For more information on 
BREAK.SV, see Keyboard Interrupts in Chapter 3 of 
your system reference manual. 

Switches: 

None. 



Format: 

SDAY month day year 

Set the system calendar. You can enter the year as 
either two or four digits (e.g., 77 or 1977). Use spaces 
or commas to separate the date arguments. 

Switches: 

None. 

Example: 

SDAY 10 17 1977} 

Set the system calendar to October 17, 1977. 



Examples: 

DEB ALPHA) 

PP/ IDA 2 LDA 2 @0 3} 

SV 

BREAK 

R 

SAVE ALPHA) 



Enter debugger to correct 
location PP 

Exit from debugger 



Save core image file as 
ALPHA.SV. 



4-64 



093-000109-01 



Licensed Material - Property of Data General Corporation 

SEDIT 

Analyze or edit a file on disk 

Format: 

SEDIT filename 

Invoke the symbolic editor to examine, analyze, or 
modify the contents of a disk file. The filename can be 
any nonsequential disk file. If you omit an extension, 
SEDIT searches for filename.SV; if does not find it, it 
searches for filename. To specify an overlay file, include 
the .OL extension. For SEDIT commands, consult the 
Symbolic Editor User s Manual. 

Global Switches: 

/N Do not search for the symbol table. Use 

this switch if there is no symbol table, or 
to edit a text or nonsave file. 



/Z 



This file starts at location 0. 



Examples: 

SEDIT MYPROG.SV) 
SEDIT REV x.x 



SEDIT finds and opens 
MYPROG.SV. 
Proceed with editing. 



MYPROG%) 

START +10//06^/i) 

S;} 

START + 1 0/ SUB # 1 SNC ) Examine a location 



$Z 

DONE 

R 



Return to the CLI by 
typing ESC Z. 



SOFTWARE DOCUMENTATION 

SMEM 

Set the memory size of each ground 
(mapped RDOS) 



Format: 

SMEM background 

Set the amount of memory which will be available to 
the background program. The foreground will receive 
the remainder. When you bootstrap RDOS, it gives all 
available memory to the background. For the 
background, enter the decimal number of 2048-byte 
blocks (pages) you want. 

You can issue SMEM only in a mapped system from 
the background CLI, while no foreground program is 

runniiig. 

Switches: 

None. 

Examples: 

SMEM 24} 

Allocate 24 2048-byie blocks of memory to the 
background, and the remaining blocks to the 
foreground. 

SMEM 48} 

Allocate 48 memory blocks to the background, and all 
remaining user memory to the foreground. 



You can find the current NMAX and ZMAX 
requirements for any program by typing the SEDIT 
commands: 

404/ nnnnnn 
401/rrrrrr 

SEDIT returns values nnnnnn and zzzzzz, which are the 
User Status Table values for NMAX and ZMAX. 



093-000109-01 



4-65 



SMEM 



EtetaCkneBl 

SOFTWARE DOCUMENTATION 

SPDIS 

Disable device spooling (RDOS) 



Licensed Material - Property of Data General Corporation 

SPEBL 

Enable device spooling (RDOS) 



Format: 

SPDIS device [...device„ ] 

Disable spooling on device. RDOS automatically spools 
data sent to any user device defined as spoolable, and 
to all the following devices: 

SDPO, SLPT, SLPTl, $PLT, SPLTl, SPTP, SPTPl, 
STTP, STTPl, and the teletypewriter versions of STTO 
andSTTOl. 

During a spool operation, RDOS queues data sent to 
output devices in disk buffers; this frees the CPU for 
further processing while the devices receive the queued 
data. If a spool operation requires more disk space than 
is available, the system itself will issue the equivalent of 
an SPDIS command. 

After you type the SPDIS command, the system will 
stop spooling data to the disabled device's disk buffer. 
Output will continue until all data waiting in the buffer 
has been processed. 

Switches: 

None. 



Format: 

SPEBL device, [...device J 

Re-enable spooling on a device for which spooling has 
been disabled. The device may be any user device 
defined as spoolable, or any of the following: 

SDPO, SLPT, SLTPl, SPLT, SPLTl, SPTP, SPTPl, 
STTP, STTPl, and the teletypewriter versions of STTO 
andSTTOl. 

RDOS does not automatically spool to the plotter 
(SPLT, SPLTl), thus you must explicitly enable 
spooling to these devices. 

Switches: 

None. 

Example: 

SPEBL SLPT) 

Re-enable spooling to the line printer. 



Example: 

SPDIS SLPT) 

This command prevents data output to the line printer 
from being spooled. To reinstilute spooling, you must 
issue the command SPEBL SLPT. If output is currently 
being spooled to the line printer, spooling will stop after 
the current spool is completed. 



4-66 



093-000109-01 



Licensed Material - Property of Data General Corporation 

SPEED 

Invoke the ECLIPSE Supereditor 



EfeMGeneral 

SOFTWARE OOCUMENTATiON 



SPKILL 

Delete the spool queue (RDOS) 



Format: 

SPEED [ftlename] 

Edit ASCII text on an ECLIPSE computer. Superedit 
features multibuffer editing, multiple I/O files, 
macroprogramming, and numeric variables. If the 
ftlename does not exist, Superedit creates it; if it does 
exist, Superedit opens it. For NOVAs, see NSPEED. 

To use Superedit from another directory, you must link 
to both of its files; these are SPEED.SV and 
SPEED.ER. 

For more information, see the Superedit User's Manual. 

Switches: 

None. 



Examples: 

SPEED FILEX) 

CREA TING NEW FILE 



UESS 
H$$ 



Superedit creates and 

opens FILEX. 

! is the Superedit prompt. 

Enter editing commands 

Update the file. 
The H ESC ESC 
command terminates 

Superedit and returns 
control to the CLI. 



Format: 

SPKILL devicei [...device^] 

Slop a spool operation by deleting the spool files 
enqueued to device. The device may be any user 
devices defined as spoolable or any of the following: 

SDPO, SLPT, SLPTl, SPLT, SPLTl, SPTP, SPTPl, 
STTP, STTPl, or the teleivpewriier versions of STTO 
andSTTOl. 

After you kill spooling on a device, data on the output 
spool is lost. Spooling will resume to the device at the 
next command which sends data to the device; e.g 
PRINT MYFILE). 

Switches: 

None. 

Example: 

SPKILL SLPT) 

This command stops the spooling of data to the first 
line printer. 



093-000109-01 



4-67 



SPKILL 



I^taGoieral 

SOFTWARE DOCUMENTATION 

STOD 

Set the time 



Format: 

STO D [hour] [minute] [second] 

Set the system dock (which is a 24-hour clock). Use 
spaces or commas to separate the time arguments. 

Switches: 

None, 

Example: 

STOD 21 24 0} 

Set the system clock to 9:24:00 p.m. 



Licensed Material - Property of Data General Corporation 

SYSGEN 

Generate a new RDOS or DOS system 

The SYSGEN command word varies with the kind of 
computer you have, as follows: 



Machine 

ECLIPSE with INFOS 
Other ECLIPSE 

Mapped NOVA 3 

Other NOVA or microNOVA 



Command Word 

ISYSGEN 
BSYSGEN 
NSYSGEN 
SYSGEN 



The SYSGEN command generates a new operating 
system. All SYSGEN questions will be displayed on the 
console. 

You will find the entire RDOS SYSGEN procedure in 
the manual How lo Load and Generate Your RDOS 
System. This manual also explains the RDOS tuning 
feature. To generate a DOS system, see the DOS 
Reference Manual. 



Format: 

SYSGEN [newsysname/S] [dialogfile/V] [loadmapfdelL] 

SYSGEN [newsysname/S] [olddiahgfile/A] | ) 

[newdialogfde/V] [tuningfdelT] [hadmapfde/L] 

Use form one of this command to generate a brand new 
RDOS or DOS system, or a different version of an 
existing system. In the first format, you choose the 
newsysname for the system and append the /S switch to 
this name. Do not use the name of the current system 
as newsysname. (If you omit a name, the system will 
assign the default name of SYSOOO.SV.) The filename 
you specify for dialogfde (by using the /V switch) will 
hold the SYSGEN dialog. The load map, which you 
may use for system diagnosis or to patch your system, 
will be output to the console unless you specify a 
loadmapJUemih the /L switch. 

Use the second format only when you want to tune an 
existing RDOS system. If you specified tuning during 

the original SYSGEN, you can use the system's tuning 
file to generate a more efficient version of the original 
system. Be sure to turn tuning off (TUOFF)) before 
generating a tuned system from the current system. 
Never generate a system which has the same name as a 
system with a tuning file. 



4-68 



093-000109-01 



Licensed Material - Property of Data General Corporation 

The new version will be saved under newsysname.SP". 
Olddialogfile is the dialog filename of the system you 
want to use as a basis for tuning. The /A switch directs 
the current system to generate the copy from 
olddialogfile. NewdialogfVe is your choice of a name for 
the new dialog file. Timmgjlle is the name of the 
SYSGENed tuning file (newsysname.TU): you must 
append the /T switch. Again, the load map will be 
displayed on the console unless you specify a 
loadmapjlle. 

After you answer the last SYSGEN question, the 
SYSGEN program analyzes your answers to its 
questions and then places the names of required 
modules and libraries for this system in CLI file 
CLI.CM (FCLI.CM for a foreground CLI). Then it 
processes CLI.CM with RLDR. If you use the global 
/N switch, SYSGEN will skip the RLDR step, and 
leave the RLDR command line in (F)CLLCM. You 
can invoke the RLDR phase once, before e.xecuting 
another SYSGEN, with the command @CL1.CM@}. 

Global Switch: 



I^taGeneral 

SOFTWARE DOCUMENTATION 



/N 



After SYSGEN do not build the new 
system with RLDR (see paragraphs 
above). 



Examples: 

SYSGEN SYS1.<SV/S SG/V LM/L>} 

This command activates the system generation 
program, which allows you to generate a new operating 
system by answering a series of questions. The new 
system will be named SYSi and will reside in files 
SYS1.SV and SYS1.0L. The dialog file will be 
SYS1.SG. The /N switch is not specified, therefore 
SYSl will be loaded automaticallv; load errors and the 
load map will go to disk file SYS.L.M. 

The following example shows RDOS svstem SYSXX. 
which was generated to include tuning, and has had 
tuning turned on for awhile. 

SYSGEN SYS2/S SYSXX.SG/Af } 
SYSXX.TU/T SYS2.SG/V SLPT/L) 

Generate a tuned system, SYS2. from the SYSXX.SG 
dialog file. The tuning file provides the most efficient 
answers from its experience with SYSXX. The tuned 
version is named SYS2 and is stored as 
SYS2.SV/SYS2.0L. The new dialog file is named 
SYS2.SG; the load map and load messages go the the 
line printer. 



Local Switches; 



name/A 
name/L 

name/S 
name/T 



name/V 



Generate a system from dialog file name. 

Send the load map to file name. (Default 
is the console). 

Give the finished system this name. 

Use tuning file name (RDOS). SYSGEN 
will use this file to enter more efficient 
responses, thus overriding the original, 

or supplementing your current SYSGEN 
responses. 

Save the SYSGEN dialog for the system 
being generated in file name. 



093-000109-01 



4-69 



SYSGEN 



EfetaGeneml 

SOFTWARE CXJCUMENTATION 

TPRINT 

Print the tuning file (RDOS) 



Licensed Material - Property of Data General Corporation 

TUOFF 

Stop recording in the tuning file (RDOS) 



Format: 

TPRINT [sysname] 

Print the tuning file for sysname.TU (you need not 
enter the sysname). 

The tuning file is always in the directory which holds 
the current RDOS system; the TUON command 
creates it. It contains use information on system slacks, 
cells, buffers and overlays. For each of these, the 
information includes: the number in the system, the 
number of requests, number of faults, and the 
percentage of faults. A fault is a request for the item 
which had to be delayed because the item, was not 
immediately available. 

If you specified an overlay report at SYSGEN, you can 
include the global /O switch to print an overlay 
frequency report on each system overlay. The tuning 
chapter of the RDOS Reference Manual describes the 
function of each overlay. 

NOTE: This command is meaningless unless (a) tuning 
was requested at SYSGEN, and (b) tuning was 
turned on (TUON) for some lime during 
system operation. 

Global Switches: 

/L Print on the line printer. 

/O Print an overlay frequency report. 

Example: 

TPRINT/LSYSXX} 

Print the tuning file for the system SYSXX on the line 

printer. 



Format: 

TUOFF 

Stop recording use data concerning buffers, cells, 
stacks, and overiays in the tuning file. TUOFF does not 
delete the contents of the tuning file. 

Switches: 

None. 

Example: 

TUOFF) 

Terminate recording in the tuning file. 



4-70 



093-000109-01 



Licensed Material - Property of Data General Corporation 

TUON 

Start recording in the tuning file (RDOS) 



I^taCkneral 

SOFTV^ARE DOCUMENTATION 



TYPE 

Display a file on the console 



Format: 

TUON 

Use TUON to turn the tuning fynction on. Assuming 
that the current operating system was generated with 
the tuning feature, it will start recording use data 
concerning slacks, cells, buffers, and overlays. For 
each of these, the report will include: the number in the 
system, total requests, total faults, and the percentage 
faulted. 

If you specified an overlay report at SYSGEN, RDOS 
will also start compiling an overlay frequency report. 
The first time you issue TUON for any tunable RDOS 
system, the system creates the tuning file and names it 
sysname.TU. Tuning data is recorded in this file 
whenever sysname is running until you issue the 
TUOFF command. Be sure to type TUOFF) before 
generating a tuned system from the current system's 
tuning file. 

Switches: 

None. 

Example: 

TUON FIRSTSYS) 

Initiate recording in the tuning file. 



Format: 

TYPE filename, [...filename., J 

Copy an ASCII file or files on the console. This 

command resembles a series of XFER/A filename STTO 
commands. To type a binary file, use FPRINT You can 
suspend output by typing CTRL-S. and resume it by 
typing CTRL-Q. This can help you read long files if your 
console is a CRT. 

Under some systems, the TYPE command types only 
80 characters per line on the console. If you have a 
DASHER, or any other 132-column console, and want 
full-page width, use the XFER command. 

The source files may come from any device. When the 
system detects a character with bad parity on paper 
tape, it types a left slash (\) and displays the message 
PARITY ERROR; typing continues. 

Switches: 

None. 

Example: 

TYPE A.SR B.SR DP1 rXX.SR) 

Display disk files A.SR and B.SR in the current 
directory, and source file XX.SR in DPI , on the console. 



093-000109-01 



4-71 



TYPE 



DataGeneral 

SOFTWARE DOCUMENTATION 

UNLINK 

Remove a link entry 



Format: 

UNLINK linknamei [...linknamej 

Unlink files by deleting one or more link entry names 
This does not affect the resolution file. 

Global Switches: 

/C Confirm each removal. The system 

repeats each link name on the console, 
and waits for you to confirm the deletion 
by typing a carriage return. To prevent 
the deletion or unlinking, press any key 
other than RETURN. 



/L 



/V 



List the deleted link names on SLPT 
(overrides /V). 

Verify each link entry deleted. 



Template Characters: 

Permitted only when the filename argument is in the 
current directory. 

Example: 

UNLINK/CTEST.-) 

Request a confirmation before deleting each link entry: 



TEST.SR}' 
TEST.RB}" 
TEST.SV% 
R 



Remove link TEST.SR; 
Remove link TEST.RB; 
Don't remove link TEST.SV. 



When you confirm a deletion with a carriage return, the 
system echoes with an asterisk (*). Otherwise, it echoes 
nothing. 



Licensed Material - Property of Data General Corporation 

VFU 

Edit a format control file for a data 
channel line printer (RDOS) 

Format: 

VFU [swiiches] vf y-f ilename 

The VFU utility allows you to create and edit format 
control files for data channel line printers; it can also 
load format control files into the printer's memorv 
You can specify three settings for the printer forms in 
each vfu-filename: tab stops, form size in lines, and 
multiple line-number/channel-number pairs. 
VFU has four functions: 

1) It creates files (always appending the .VF extension 
to your specified filename). 

2) It displays files. 

3) It edits existing .VF files. 

4) It loads an existing .VF file into the printer's 
memory. 

It can also enable and disable access to the printer's 
memory by user programs. 

You specify each VFU function with a global switch. 
You must specify an enable or disable command alone; 
otherwise, you can enter multiple commands with 
multiple switches. In a multiple command line, the 

Create and Edit commands are processed first. 
followed by load commands, then display commands' 
You need not enter the .VF extension to access VFU 

files. 

Create a .VF File (VFU/C) 

When you type VFU/C filename, the VFU program 
announces itself, then displays the new filename^nd 
asks: 



1. TAB CONTROL: 

WANT STANDARD TABS (EVERY 8 COLUMNS)'? 
ENTER Y/N = = > ' 

If you want standard tab stops (at column 0, 7, 15, 
...127). type Y ; VFU then skips to question 3 To 
set your own tabs, answer N ; VFU then asks: 

2. ENTER COLUMN NO. (1-132) OR CR = = > 

Enter each column number at which you want a tab 
Slop in this file; press } after typing each number. 
vFU will repeat this question until vou tvpe onlv )• 
it then asks; ' ' ' 



4-72 



093-000109-01 



Licensed Material - Property of Data General Corporation 

3. VFU CONTROL: 

WANT STANDARD (1 1 INCH)? 

ENTER Y/N == = > 

The answers you give lo quesions 3. and 4. cannot 
be changed in this file. A "standard" form is 1 1 
inches (66 lines) long, has channel one set for line 
1. and channel 12 set for line 63. If you want 
standard control for the forms which you will print 
using this file, type Y ; VFU then skips lo question 
5. To specify a different form length, type N ; VFU 
then asks: 

4. ENTER FORM SIZE IN LINES (1 -1 43) = = > 

Enter the number of vertical lines in the forms 
which you will print using this file. 

Next, VFU asks: 

5. ENTER LINE NUMBER OR CR =-> 

Specify a vertical line in which you want to set a 

channel "hole", then type ). VFU asks: 

6. ENTER CHANNEL NO. (1-12) = = > 

Specify the channel number which you want to 
associate with the line number you gave in the last 
question. VFU then asks questions 5 and 6 again; it 
continues asking these questions until yoii type ) in 
response to 5. 

VFU now creates vfu-filename.VF and returns to the 
CLI. 



Display a File (VFU/L for first line printer, 
VFU/V for console) 

Global Switches 

/S Display settings on the second line 

printer (e.g., VFU/L/S). 

Local Switches 

name/L Send settings lo file name (overrides 

global /L). 

/V Display vfu-filename's settings on the 

console. 



I^taGoieral 

SOFTV^ARE DOCUMENTATION 

VFU displays the tab-stop and VFU channel settings or 
sends them to the specified file. It shows 
line-number/channel sellings in the form "1-c", 
where 1 is the line number of a "hole" and c is the 
channel number of a "hole". If you defaulted creation 
question 3, thus specifying 11-inch forms for a file, 
VFU channels would be shown as: 

1-1 63-12 



Edit a File (VFU/E) 

If you specify a display option with /E (i.e., VFU/V/E), 
the vfu-filename will be displayed. VFU then asks about 
tab control: 

1. TAB CONTROL: 

ENTER COLUMN NO. (1 -1 32) OR CR = = > 

Specify a column number where you wish to set a 
new tab or clear an old tab, and type ). Then, VFU 
asks: 

2. ENTER SET(S) OR CLEARCC) = = > 

To set a tab at the column number specified in step 
1 ., type S; to clear a lab at this column, type C. VFU 
now asks question 1. again; it continues this loop 
until you type } in response lo 1. 

Now, VFU asks vertical format questions: 

3. VFU CONTROL: 

ENTER LINE NUMBER OR CR = = > 

Respond with the line number of a channel "hole" 
which you wish lo set or clear, and }. VFU then 
asks about the channel number associated with this 
line number: 

4. ENTER CHANNEL NO. (1-12) = = > 

Enter the channel number which you want to 
associate with the line number (for Set) or which is 
already associated with the line number (for Clear). 
Now, VFU asks: 

5. ENTERSET(S)ORCLEAR(C) - = > 

To set a new channel "hole", type S; to clear an 
existing "hole", type C. VFU then repeats 
questions 3, 4, and 5 until you respond with ) to 3. 

VFU now updates the existing vfu-filename with the 

new setting, and displays the new settings on the 

display file you specified (with /V, etc.). 



093-000109-01 



4-73 



VFU 



DataGeneral 

SOFTWARE DOCUMENTATION 

VFU (continued) 



Load a File into the Printer's Memory 

(VFU or VFU/X for $LPT, VFU/S for $LPT1) 

For the first data channel line printer, type VFU 

vfu-filename; for the second DCH printer, type VFU/S 
vfu-filename. VFU then displays a prompt message. 
When you strike a key and the printer is ready, VFU 
kills spooling and XFERs the vfu file into the printer's 
memory. You can then print files on the forms which 
need the format control contained in the vfu file. 

Access Control (VFU/A and VFU/D) 

User programs can access the printer's memory directly 
to change tab and VFU settings after you type VFU/A or 
VFU/A/S for the second printer. The printer memory is 
unprotected until someone loads a VFU file or disables 
access with VFU/D (VFU/D/S). 

Examples: 

VFU/CPAYR0LL1) 

DA TA CHANNEL LINE PRINTER FORMA T 

CONTROL PROGRAM 

CREATLNGPA YROLLl. VF 

TAB CONTROL: 

WANT STANDARD TABS (EVER ¥8 COL UMNS) ? 

£AT£^}7V = = >N 

ENTER COLUMN NO. (1-132) OR CR 3} 

ENTER COLUMN NO. (1-132) OR CR 9} 

ENTER COL UMNNO. (1-132) OR CR 1 6} 
ENTER COLUMN NO. (1-132) OR CR 28} 
ENTER COLUMN NO. (1-132) OR CR 50) 
ENTER COLUMN NO. (1-132) OR CR } 

VFUCONTROL: 

WANT STANDARD (11 INCH) ? 
ENTER YIN = = > n 

ENTER FORM SIZE IN LINES (1-143) ^=^>4A) 
ENTER LINE NUMBER 0RCR=''=>1) 
ENTER CHANNEL NO. f/./Jj = = > i ) 
ENTER LINE NUMBER O^ C^ - - > 4} 
ENTER CHANNEL NO. (1-12) = « > 2) 
ENTER LINE NUMBER ORCR-^^y^) 
ENTER CHANNEL NO. (1-12) = - > 3) 
ENTER LINE NUMBER O^ O - = > 41 ) 
E.^'TER CHANNEL NO. (1-12) ^^> 12) 
ENTER LINE NUMBER ORCR='->)' 

This sequence created VFU file PAYROLLl.VF. The 
next sequence shows a combined displav/edit and 
loading of this file. 



Licensed Material - Property of Data General Corporation 

VFU/V/EPAYR0LL1) 

DA TA CHANNEL LINE PRINTER FORMA T 

CONTROL PROGRAM 

PA YROLLL VF 06/15/77 14:22:16 

TAB STOPS: 

3, 9, 16, 28, 50 

VFU CHANNELS: 

1-1, 4-2, 9-3, 41-12 

EDITING PA YROLLl. VF 

TAB CONTROL: 

ENTER COLUMN NO. (0-132) 0RCR==^>8) 

ENTER SET(S) OR CLEAR fO = = > S) 

ENTER COLUMN NO. (0-132) 0RCR^ = >9) 

ENTER SET(S) OR CLEAR fO = = > C) 

ENTER COLUMN NO. (0-132) ORCR^ = >) 

VFUCONTROL: 

ENTER LINE NUMBER Oi? C^ = = > 1 4) 

ENTER CHANNEL NO. (1-2) = = > 4} 

ENTER LINE NUMBER ORCR===>) 

PA YROLLl. VF 06/15/77 14:28:25 

TAB STOPS: 

3, 8, 16, 28, 50 

VFU CHANNELS: 

1-1, 4-2, 9-3, 14-4, 41-12 

R 

VFU PAYR0LL1 } 

DA TA CHANNEL LINE PRINTER FORMA T 

CONTROL PROGRAM 

PREPARE TO LOAD PA YROLLl. VF 

WAIT UNTIL OUTPUT TO THE PRINTER HAS 

COMPLETED. MAKE SURE PRINTER IS READY 

AND ON-LINE. 

STRIKE ANY KEY WHEN READY 

Someone now strikes a key. 

R 

The next sequence enables, then disables, access to the 
prmter's memory by the program INVOICEAPR.SV. 

R 

VFU/A) 

DA TA CHANNEL LINE PRINTER FORMA T 

CONTROL PROGRAM 

ENABLING ACCESS TO PRINTER CONTROL 

MEM OR Y 

R 

INVOICEAPR) 



R 

VFU/D) 

DA TA CHANNEL LINE PRINTER FORMA T 

CONTROL PROGRAM 

DISABLING ACCESS TO PRINTER CONTROL 

MEM OR Y 

R 



4-74 



093-000109-01 



Licensed Material - Property of Data General Corporation 

XFER 

Copy the contents of a file to another file 



Format: 

XFER sourcefile destinationfile 

Copy a file on any device lo another file on any device. 
The sourcefile and destinationfile can be any disk 
filename or device, as shown in Table 2-2 or 2-3. Each 
can include directory specifiers, but cannot be a 
directory. When you XFER a file to disk, XFER creates 
the destinationfile name and copies the contents of 
sourcefile into it. The old file's name, attributes, 
creation date, etc., are not copied. 

In RDOS. if you omit switches, XFER organizes the 
destination file sequentially. RDOS cannot execute 
sequential files, so, if you XFER a save file to disk, be 
sure to append the local /R switch to the destination 
filename. In DOS, if you omit switches, XFER 
organizes the desination file randomly. In either 
system, be sure to CHATR a destination'save file +S 
after the transfer. 

During the transfer, the system will detect parity errors 
in all ASCII source files, and in binary files on magnetic 
or cassette tapes. On a parity error, it displays a 
P.ARITY ERROR message. For a paper tape file, it 
displays a backslash (\) for each bad character. For mag 
tape or cassette files, it aborts the command after 
detecting a parity error. 

You can use XFER to copy te.xt directly into a file via 
the form: 

XFER/A STTI filename [.MC] ) 

Type in the CLI commands you want, then terminate 
the transfer with CTRL-Z. See Chapter 3 for examples. 

Global Switches: 

/A This is an ASCII transfer. Transfer the 

file line by line, taking appropriate 
read/write action, such as inserting line 
feeds after carriage returns (if this 
pertains to the destination file). 



E^taGeneml 

SOFTWARE DOCUMENTATION 



Local Switches: 

destinationfile/C Organize the destination file 
contiguously (both files must be disk 
files). 

destinationfile/R Organize the destination file 
randomly (see comments above). 

Examples: 

XFER SPTR Q) 

LOADSPTR. STRIKE ANY KEY 

Create disk file Q; then wail for sequence to load the 
reader and strike a key. Then copy the tape in the 
reader to file Q. 

XFER SPTR SPTP) 

Copy the tape in the paper tape reader to the paper tape 
punch. 

XFER MYPROG.SV DPI :fv1YPR0G.SV/R} 

Copy ABLE.SV from the current directory to file of 
the tape on drive MTO. The copy receives no name on 
the tape. This example continues: 

XFER ABLE.SV MTO:0) 

Copy ABLE.SV from the current directory to file of 
the tape on drive MTO. The copy receives no name on 
the tape. This example continues: 

XFERfVlTO:OABLE.SV/R 

FILE ALREADY EXISTS: ABLE.SV 

R 

Normal filename rules apply when you XFER a file to a 
disk directory. 

XFER/A/B QTY:7 DP4:MUXN0TES} 

Append the text input from ALM or QTY line 7 to a 
disk file in DP4 named MUXNOTES. The user on QTY:7 
can terminate input with CTRL-Z. 



/B 



Append the source file to the end of the 
destination file. Y'ou must use this to 
XFER to an existing disk or tape file. 



End of Chapter 



093-000109-01 



4-75 



XFER 



Licensed Material - Property of Data General Corporation 



EfetaGeieral 

SOFTWARE DOCUMENTATION 



Appendix A 
Error Messages 



This appendix describes all ihe error messages that you 
may receive while operating the CLI. Some error 
messages can result only from misuse of RDOS or DOS 
systems or task calls in a user program; the explanation 
of these is preceded by the letters "OS". Normally, 
these represent the CLFs attempt to describe the error 
when you have specitled .ERTN as an error return 
from a system or task call. If you receive such an error 
message, check the descriptions of the questionable call 
in your system reference manual. 

Most utility program error messages aren't covered 
here. If you receive an error message from a utility, 
consult the appropriate utility manual. Most Data 
General utility programs take the error return to the 
CLI when they cannot proceed; the CLI then attempts 



to interpret the error code passed in AC2. Generally, 
the CLFs explanation of the problem, is accurate, but 
the argument it gives can be misleading. See "Error 
Handling" in Chapter 2 for more on this. 

If you have an INFOS file system, consult the INFOS 
manual for an explanation of INFOS error messages. 

Occasionally, you may receive irrelevant error 
messages. These can be caused by hardware problems, 
among other things. If they recur, run the appropriate 
diagnostic program on your equipment. 

Certain serious error conditions can halt the system in 
exceptional status. These are described in the 
Exceptional Status Appendix of your system reference 
manual. 



Table A-1. Error Messages 



Message 



A ZERO .XMT OR .IXMT 
MESSAGE 

ADDRESS ERROR IN .SYSTM 

ARGUMENT 

ALM LINE NOT READY ' 

ATTEMPT TO CREATE A 
ZERO LENGTH CONTIGUOUS 
FILE 

ATTEMPT TO READ INTO 
SYSTEM SPACE 

ATTEMPT TO RELEASE AN 
OPEN DEVICE 

ATTEMPT TO RESTORE A 
NON-EXISTENT IMAGE 



Meaning/Action 



OS. Attempt to transmit a zero word message. 

OS. A program tried to reference an address 
outside address space (mapped RDOS only). 

OS. The ALM line modem is not ready. 

Via CCONT or system calls .CCONT or .CONN. 



A program tried to read into an RDOS/DOS 

reserved address (unmapped system only). 

OS. Attempt to release a tape unit with an open 
file. 

You issued the POP command from a level CLI. 



093-000109-01 



A-1 



Error Messages 



DataGoieral 

SOFTWARE DOCUMENTATION 



Licensed Material - Property oi Data General Corporation 
Table A-1. Error Messages (continued) 



Message 



ATTEMPT TO WRITE AN 

EXISTENT FILE 

BLANK TAPE 



CHANNEL ALREADY IN USE 



CHANNEL CLOSED BY 
ANOTHER TASK 



CHECKSUM ERROR 
COMMON SIZE ERROR 

COMMON USAGE ERROR 



CONSOLE INTERRUPT 
RECEIVED 

CANNOT CHECKPOINT 
CURRENT BG 



DEVICE ALREADY IN 
SYSTEM 

DEVICE NOT IN SYSTEM 



DEVICE PREVIOUSLY 
OPENED 

DEVICE TIMEOUT 



DIRECT I/O ACCESS ONLY 



DIRECTORY DEPTH 
EXCEEDED 



Meaning/Action 



OS. Your program attempted to write an existing 
file. 

OS. A program issued an .INIT or .MTOPD call to 
a drive which contained a new tape. Type INIT/F to 
initialize new tapes. 

OS. The I/O channel specified is in use bv another 
file. 

OS. Two tasks share an I/O channel, and one of 
them closed the channel before the other could 
complete its I/O. 

Detected during input. 

OS. Communications area (.ICMN) size too 
small. 

OS. Other program defined no communications 
area. 

OS. On a read from or write to a multiplexed line, 
a console interrupt occurred. 

OS. The background program is not 
checkpointable (.EXBG). Causes can be: 
multiplexed I/O, user interrupt routine, 
outstanding .RDOPR/.WROPR, or BG is already 
checkpointed. See .EXBG in your system manual 
for other causes. 

The device or directory has already been 
initialized. 

You tried to access an uninitialized directory or 
device; INIT it (or DIR to it). 

OS. Attempt to open a mag tape or cassette that is 
already open. 

OS. 10-second disk timeout occurred on a 

nonmaster device. Try inserting a disk, and 
putting the drive on-line. 

OS, A program tried to perform nondirect-block 
I/O on a file which requires direct-block I/O. 

You tried to create a directory within an 
equivalent directory (e.g., a subdirectory while in 
a subdirectory); or you attempted to LOAD 
(FLOAD) a dump file containing a directory into 
an equivalent directory. 



A-2 



093-000109-01 



Licensed Material - Property of Dala General Corporation 

Table A-1. Error Messages (continued) 



IktaGoiemI 

SOFTWARE OOCUWENTATION 



Message 



DIRECTORY IN USE 



DIRECTORY NOT 
INITIALIZED 

DIRECTORY SHARED 



DIRECTORY SIZE 
INSUFFICIENT 

DISK FORMAT ERROR 



DUPLICATE READ OR 
DUPLICATE WRITE 



END OF FILE 



ERROR IN USER TASK 
QUEUE TABLE 

ERROR: CAN'T MAKE SENSE 
OUT OF THIS LOAD MAP 
(PATCH command) 

ERROR: CONTENTS OF 

PATCH LOCATION DOES NOT 

MATCH NEW OR CURRENT 
LOCATION SPECIFIED 
(PATCH) 

ERROR: FIRST CHARACTER 
IN PATCH FILE LINE IS NOT A 
VALID CHAR 

ERROR: INDIRECTION 
ERROR - ADDRESS OUT OF 
RANGE (PATCH) 



Meaning/Action 



You tried to: 1) release, deleie, or rename a 
directory which has an open file; 2) delete or 
rename a directory or device which has been 
initialized; or 3) initialize a directory which the 
other CPU is using, in a dual processor svstem 
under IPB. 

For I ) , check file use counts in the directory 
(LIST/U), and CLEAR/A/V/D if necessary. 

You tried to access an uninitialized directory or 
device. 

This message occurs when a directory used by 
both grounds is released by one ground. It is 
merely a warning. 

You (or a program) tried to create a partition with 
fewer than 48 (60g ) disk blocks. 

This can occur when you INIT a disk. It can often 
be simply a warning, after which the system does 
initialize the disk, or it can indicate a fatal format 
error. If possible. DUMP the disk and run 
DKINIT.SV (DOSINIT.SV) or a formatter 
program on it. 

OS. Multiplexed lines. Read from a line from 
which a program is reading, or write to a line 
which a program is writing. 

End of file detected (often on tape, when you try 
to access a file beyond the logical end-of-tape). 
Try a lower file number. 

OS. Illegal information in task queue table 
(.QTSK). 

The load map you specified to PATCH has a 

symbol whose name exceeds six characters, or a 
premature end-of-file was detected. 

The contents you specified in ENPAT must match 
the original contents of the disk location. Check 
the location with a disk editor. 



Create another paichfile, using ENPAT. 



The patchfile specified a negative address. 



093-000109-01 



A-3 



Error Messages 



EyaGeieral 

SOFTWARE DOCUMENTATION 



; Licensed Material - Property of Data General Corporation 

Table A-1. Error Messages (continoed) 



Message 



ERROR: INSUFFICIENT 
MEMORY TO HOLD CORE 
RESIDENT LOAD MAP 
(PATCH) 

ERROR: argument ALREADY 
SPECIFIED (PATCH) 

ERROR: UNABLE TO 
EVALUATE xxxx FIELD 
(PATCH) 

EXEC ERROR ON CHAIN: 
LOG FILE IF ANY CLOSED 



FATAL OUTPUT ERROR 



FATAL SYSTEM UTILITY 
ERROR 



FATAL UTILITY ERROR 



FILE ALREADY EXISTS 



FILE ATTRIBUTE 
PROTECTED 

FILE DATA ERROR 



FILE DOES NOT EXIST 

FILE IN USE 

FILE NOT OPEN 

FILE POSITION ERROR 

FILE READ PROTECTED 
FILE SPACE EXHAUSTED 



Meaning/Action 



PATCH stores the load map above NMAX, below 
HMA, and uses four words for each symbol. You 
may need to generate a smaller system to 
PATCH. 

You specified the save file, load map, or patch file 
twice in the PATCH command line. 

Create another patchfile, using ENP.AT (ENPAT 
checks for valid location fields). 



Fatal CLI runtime error. The CLI was unable to 
execute a CHAIN command. Attempting to 
CHAIN closes all files. The CLI will restart. 

Fatal CLI runtime error, encountered while the 
CLI was trying to write to a channel. The CLI will 
restart. 

An unrecoverable error was detected within a 
utility. This can occur if the utility required a 
support file (e.g., MACXR.SV) and couldn't find 
it on disk, 

OS. A program has passed ERFUE to the CLI via 
.ERTN. 

You tried to create a file whose name exists in the 
current directory; or you tried to move or load 
such a file into the current directory without 
appropriate switches. 

You tried a forbidden operation on a file whose 
attributes were fixed via the system .CH.ATR call. 

File read error. If on tape, this can mean that the 

tape heads need cleaning. 

The file does not exist in the current or specified 
directory. 

You tried to delete, dump, rename, or alter a file 
which is in use. Check its use count with LIST/U 
filename; then CLE.AR it if necessary. 

OS. The file has not been opened. 

OS. A program tried to set an illegal pointer 
position in a file (.SPOS). 

Its attributes forbid reading. 

Out of disk space in the current partition or 
diskette; on mag tape - EOT reached while 
writing. 



A-4 



093-000109-01 



Licensed Material - Property of Data General Corporation 

Table A-1. Error Messages (continued) 



DataGeneral 

SOFTWARE DOCUMENTATION 



Message 



FILE WRITE PROTECTED 

FILES MUST EXIST IN THE 
SAME DIRECTORY 

FOREGROUND ALREADY 

RUNNING 



ILLEGAL ARGUMENT 
ILLEGAL ATTRIBUTE 
ILLEGAL BLOCK TYPE 



ILLEGAL CHANNEL 
NUMBER 

ILLEGAL COMMAND FOR 
DEVICE 

ILLEGAL DIRECTORY NAME 

ILLEGAL FILE NAME 

ILLEGAL INDIRECT FILE 

NAME 

ILLEGAL NUMERIC 

ARGUMENT 

ILLEGAL OVERLAY NUMBER 

ILLEGAL PARTITION VALUE 



ILLEGAL SYSTEM 
COMMAND 



ILLEGAL VARIABLE 



ILLEGAL TEXT ARGUMENT 



Meaning/Action 



Its attributes prevent it from being modified. 
The files specified are in different directories. 

A foreground program is running, and you tried 
to: I) change BG/FG memory allotments; or 2) 
CLE.AR file use counts to 0; or 3) execute a 
program in the foreground. 

An illegal character in an argument. 

You specified an undefined attribute. 

You tried to LOAD a file which is not in DUMP 
formal or to FLOAD a file which is not in 
FDUMP format, or to XFER a dumped file. Use 
appropriate command. 

OS. A system call specified a channel number 

greater than 377g. 

OS. A program tried to perform illegal I/O (e.g., 
free-form I/O on disk data). 

Illegal character in directory name or specifier. 

The legal characters are A-Z, 0-9, and S. 

Unmatched @ in command line. 



Nonnumeric character in numeric argument, 
numeric argument too large, or incorrect base. 

OS. The specified overlay does not exist. 

Results from SMEM command, in mapped 
system only. 1) You tried to allocate more 
memory to BG than is available to both grounds; 
or 2) BG memory allotment is too small for BG 
CLI; or 3) You typed SMEM from any level other 
than 0. 

You typed a command which is not supported in 
the current environment (e.g., SMEM in an 
unmapped system). 

Variable undefined, or unmatched % in command 
line. 

Unmatched quotes (") in message command. 



093-000109-01 



A-5 



Error Messages 



I^taGeieral 

SOFTWARE DCX;UMENTATION 



Licensed Material - Property of Data General Corporation 
Table A-1. Error Messages (continued) 



Message 



Meaning/Action 



INSUFFICIENT CONTIGUOUS 
BLOCKS 



INSUFFICIENT MEMORY TO 
EXECUTE PROGRAM 



INSUFFICIENT ROOM IN 
DATA CHANNEL MAP 

INVALID BAD BLOCK TABLE 



INVALID TIME OR DATE 
LINE TOO LONG 



LINK ACCESS NOT 
ALLOWED 

LINK DEPTH EXCEEDED 



LOG FILE ERROR 



MAP.DR ERROR 



MCA REQUEST 

OUTSTANDING 



MTOPERRn (FDUMP, 
FLOADI 



Not enough contiguous blocks are available to 
create your desired contiguous file or partition, 
or, the current directory lacks space for the 
contiguous file you tried to LOAD (FLOAD) or 
MOVE into it. Try retyping the command line 
with overlay (.OL) filenames before other 
filenames. (Overlay files are contiguous.) 

The program requires more memory than is 
available in the background (or mapped 
foreground after EXFG or .EXFG). 

OS, Improper channel size specified in .IDEF call 



If you can INIT the disk, DUMP it and run 
DKINIT.SV on it; if you can't INIT it, run the 
DKINIT PARTIAL command on it. 

Attempt to set an illegal time or dale. 

Command line limit (132 characters) exceeded on 
console input or read/write I/O. 

Attempt to access a linked file whose attributes 
forbid linking (CHEAT). 

You tried to LINK to a resolution file via more 
than nine intermediate links, or you attempted to 
reference a resolution file via more than ten 
intermediate link entries. 

Fatal CLI runtime error, while CLI was writing to 
the log file. The CLI will attempt to close the log 
file and restart. 

File system MAP.DR inconsistency detected. This 
is serious. Try to dump the disk, then fully 
initialize (INIT/F) it. 

1) OS. The MCA transmitter is trying to transmit, 

and the receiver has issued no receive request. 2) 
k program tried to transmit on an .MC.A channel 
on which either the receiver or transmuier was 
waiting for the other to send or receive. 

For FDUMP. write ring may be on reel; or you 
may not have stacked dumps properly by 
incremenimg file numbers by three. .A valid stack 
example is: DIR MYDIR;FDUMP yTO:0;DIR 
Y0URD1R;FDUMP MT0;3: DIR HERDIR:FDUMP 
MT0;6. etc. 

For FLOAD, you may nol have specified stacked 
file numbers properly, incrementing by three. 
You'd FLO.AD the example above as; DIR 
MYDIR;FLOAD MT0;0;DIR YOURDIR:FLOAD ^ 
MT0;3: DIR HERDIR;FLOAD MT0;6 etc 



A-6 



093-000109-01 



Licensed Material - Property of Data General Corporation 

Table A-1. Error Messages (continued) 



I^laGoieral 

SOFTWARE DOCUMENTATION 



Message 



MTn NOT READY - MAKE IT 
READY! (FDUMP) 

NO DEBUG ADDRESS 



NO DIRECT I/O 

NO FILES MATCH SPECIFIER 

NO MCA REQUEST 
OUTSTANDING 

NO MORE DCBS 



NO ROOM FOR UFTS 



NO SOURCE FILE SPECIFIED 
NO STARTING ADDRESS 



NO STARTING ADDRESS FOR 
LOAD MODULE 



NO SUCH DIRECTORY 



NOT A COMMAND 



NOT A LINK ENTRY 



NOT A SAVE FILE 



NOT ENOUGH ARGUMENTS 

name OPEN ERR - FILE NOT 
DUMPED (FDUMP) 

OPERATOR MESSAGES NOT 
SYSGENED 



Meaning/Action 



The tape drive specified is not ON LINE. 



You issued the DEB command for a file which was 
not loaded with a Debugger (RLDR global /D 
switch). 

OS. File not accessible by direct-block I/O. 

No match on template characters (- and *). 

No outstanding receive request by an MCA 
device. 

You tried to initialize loo many 
directories/devices at any given moment. Release 
one. or generate a new system which allows more 
to be INTTed at one time. 

Not enough channels defined for program before 
assembly C.COMM TASK) or loading (/C switch 
in RLDR). This can also occur if you try to 
execute a stand-alone program from the CLI. Use 
the BOOT command. 

Your utility command requires a source file. 

You tried to execute a program which does not 
specify a starting address. See the next error 

message. 

RLDR command. The user program was written 
without a starling address, and cannot be 
executed. Specify a START address after the last 
.END pseudo-op. 

The specified directory hasn't been initialized, or 
isn't where you specified, or doesn't exist. 

CLI error, resulting from modification of CLI.SV 
orCLI.OL. 

You tried to UNLINK a file lacking the link 
characteristic. 

The file must be a program, and ii requires the 
save and random attributes. XFER it with the 
local /R switch, and/or CHATR it +S. 

Your command requires more arguments. 

Filename is in use (open), hence could not be 
dumped. The dump continues. 

OS, Your program contains OPCOM or 
.RDOPR/.WROPR calls, yet the operator 
message feature wasn't selected at system 
generation. 



093-000109-01 



A-7 



Error Messages 



SOFTWARE DOCUMENTATION 



Licensed Material - Property of Data General Corporation 

Table A-1. Error Messages (continued) 



Message 



OUTOFTCB'S 

PARITY ERROR 

PERMANENT FILE 

PHASE ERROR 

PROGRAM NOTSWAPPABLE 

PUSH DEPTH EXCEEDED 
QTY ERROR 

RDOS ERROR 



READ FRAMING ERROR 

READ OVERRUN ERROR 

name READ-LOCKED - NOT 
DUMPED 

SIGNAL TO BUSY ADDRESS 

SPOOL FILES ACTIVE 

STACK OVERFLOW 



Meaning/Action 



OS. AH TCBs are in use. Process the program with 
RLDR again, and specify more tasks with the /K 
switch. 

Parity error on read or write sequential of mag 
tape or cassette. Possibly the tape heads need 
cleaning. 

You tried to delete a file which has the P attribute 
(CHATRor.CHATR). 

OS. Attempt to reference a location with less than 
the minimum valid value. 

OS. The program given as an argument to .EXEC 
cannot be swapped into memory. 

OS. Attempt to .EXEC from level four. 

Simultaneous read or write to same multiplexor 
line. 

This means that a system utility or user program 
took the error return through .ERTN, but the CLI 
could not interpret the value returned in AC2. 
(The value in AC2 was not defined to the CLI.) 
This can happen when any program lacks disk 
space to create the desired files, or if you are using 
incompatible revisions of system utility programs 
(e.g., if the Macroassembler and CLI are of 
different revision levels). 

If disk space is the problem, use the DISK 
command, provide more disk space or execute the 
command in another directory; if incompatibility 
is the problem, use the REV command and try a 
different rev of the utility, CLI. or system. 

OS, multiplexed lines. A hardware framing error 
occurred. 

OS. multiplexed lines. A hardware overrun error 
occurred. 

FDU.MP filename has the R (read-proiecied) 
attribute. Dumping coniinues. 

OS. Message address is already in use. 

•Attempt to release the master directory while ii is 
spooling data to output devices. Either wail, or kill 
spooling to devices with SPKILL, 

Fatal CLI runtime error, w^hich sometimes occurs 
when the CLI tries to execute a very long 
command line. The CL! will rcsiari. 



A-8 



093-000109-01 



Licensed Material - Property of Data General Carporation 

Table A-1. Error Messages (continued) 



DataGeneral 

SOFTWARE DOCUMENTATION 



Message 



SYNTAX ERRORJLLEGA' 
NESTING OF <> AND 

SYNTAX ERROR:ILLEGAL 
NESTING OF AND 

SYNTAX ERROR INSIDE 

SYNTAX 

ERROR:UNMATCHED OR 
NESTED (1 

SYNTAX 
ERROR:UNMATCHED OR 

NESTED 

SYNTAX ERROR: "<" 
WITHOUT ">•• OR" > •• 
WITHOUT ••<■• 

SYS.DR ERROR 



SYS ERR RTN OFFSET nnnnnn 



SYSTEM DEADLOCK 



SYSTEM STACK OVERFLOW 



TAPE HAS WRONG REEL NO. 



TASK ID ERROR 

TASK NOT FOUND FOR 

ABORT 

TEXT ARGUMENT TOO 
LONG 

TOO MANY ARGUMENTS 



TOO MANY SOFT ERRORS 



TOO MANY LEVELS OF 
INDIRECT 



Meaning/Action 



The co.Tjmand line contained a parenthesis-angle 
bracket pair. 

Parentheses aren't allowed inside brackets 
(RLDR overlay detlniiion). 

Illegal character or sequence inside brackets. 

Brackets must be matched, but not nested. 



Parentheses must match, and can't be nested. 



Unmatched angle brackets. 



Inconsistency in file system SYS.DR delected. 
Dump the disk if possible; then fullv initialize 
(INIT/F) it. 

FDU.MP, FLOAD. RELEASE the drive, and try 
the command again. 

The system has run out of buffers. Wait until a 
task or program has finished its I/O. 

System stack capacity has been reached and 
exceeded. Wait a minute or so, then rebootstrap 

the system. 

FLOAD. You are loading an FDUMPed reel out 
of sequence. Mount the correct reel and strike a 
key. This can also happen if you FLOAD slacked 
dump files with the wrong file numbers; see error 
message MT OP ERR n. 

OS. Task ID not valid in current environment. 

OS. A program tried to abort a nonexistent task. 



The CLI encountered more than 72 characters 
between quotes ("). 

You entered too many arguments to the 
command. 

The DOS soft error count has reached its 
maximum for this diskette. Copy the diskette with 
DOS I NIT. 

You've established too many levels of indirect 
files (afilename#). 



093-000109-01 



A-9 



Error Messages 



SOFTWARE DOCUMENTATION 



Licensed Material - Property of Data General Corporation 
Table A-1. Error Messages (concluded) 



Message 



TOVLD NOT LOADED FOR 

QUEUED OVERLAY TASKS 



TRANSMISSION 
TERMINATED BY RECEIVER 



UNIT IMPROPERLY 

SELECTED 

VIRTUAL BUFFER FILE 
ERROR 



YOU CANT DO THAT 



Meaning/Action 



OS. The multitask overlay loader has not been 

loaded from the system library with your 
program, as required by your environment. Insert 
a .EXTN .TOVLD in the source program, then 
re-assemble and reload it. 

The MCA transmission was terminated 
prematurely because its length exceeded that 
requested by the receiver. 

Mag or cassette tape or disk drive not turned on, 
or not ON LINE. 

Fatal CLI runtime error, relating to a problem in 
the CLI buffer Files CLI.TCO, 1 ,2,3,4) 
CLI.S(0,1, 2,3,4) or CLI.C(0,1, 2,3,4). The CLI 
will restart and try to solve the problem. 

You attempted something grossly invalid, like 
typing ENDLOG without giving the password 
specified in LOG, or running an ECLIPSE 
program on a NOVA. 



End of Appendix 



A-10 



093-000109-01 



Licensed Material - Property of Data General Corporation 



DataGeneral 

SOFTWARE DOCUMENTATION 



Appendix C 
Dump File Format 



The DUMP command copies file data from an input 
file to an output file; while copying each file, it formats 
data in the outputfile into eight different kinds of 
blocks. When you LOAD the file, the data in these 
blocks is placed in the file directory's SYS. DR. Most of 
the tapes you received from Data General are in 
DUMP formal (others are in XFER format). The block 
types described here apply to DUMP, not FDUMP. 

The output file produced by DUMP is called a dump 
file, although it often consists of many disk files. The 
system assigns an end block to each partition, 
subdirectory and DOS directory in a dumpfile, and to 
the last data file in the dumpfile. Each dump file is 
formatted into the following types of blocks: 

Types 

1. Name blocks 

2. Data blocks 

3. Error blocks 

4. End blocks 

5. Time blocks 

6. Link Data blocks 

7. Link Access Attribute blocks 

8. End of Segment blocks 
(paper tape) 



Every dumpfile begins with a name block and ends with 
an end block. Each subdirectory in the dumpfile also 
ends with an end block (e.g., in the dumpfile produced 
by DUMP MTO:0 SUBDIR.DR -.SR). both the end of the 
contents of SUBDIR and the last -.SR file would be 
followed by an end block). An RDOS secondary 
partition does not end with an end block in the 
dumpfile, but an end block is provided for it at the end 
of the dumpfile. For example, assume that secondary 
partition 2NDPART contains one subdirectory. The 
dumpfile producd by the command DUMP 'mT0:0 
2NDPART.DR -.SR) would have three end blocks -- one 
at the end of the subdirectory in 2NDPART, and two at 
the end of the dumpfile. 

Block Identifier Byte These formats are given in the following illustrations: 

377 
376 
375 
374 
373 
372 
371 
370 



377 



attri- 
butes 



contiguous biks. 



data 



null 



■NAME BLOCK 
size 

1 byte 

2 bytes 
2 bytes 



variable 



contents 

block type identifier. 

attributes. 

no. of contiguous blocks only if contiguous 
characteristic set. 

filename. (A period is added to each filename 
without an extension.) 



NOTE: The filename is written by means of system call 
.WRS, so if reading from paper tape, you must use 
system call .RDS to avoid parity problems. 



093-000109-01 



C-1 



Dump File Format 



SOFTWARE DOCUMENTATION 



376 



byte 
count 



checksum 



Licensed Material - Property of Data General Corporation 

DATA BLOCK ■ — — 



Size 

1 byie 

2 bytes 
2 bytes 

n bytes 



Contents 

block type identifier, 
byte count. 

checksum (word count modulo 2 -f total 

contents of all full words). 
data (Tile contents). 

no terminator 



NOTE; Any odd byte is wrUten in "data" and is added in 
"byte count" but it is not summed. There is no 
end-around carry. 



375 



ERROR BLOCK 

Size Contents 

I byte block type identifier. 

NOTE: This block causes the file you are currently loading to 
be read through to the end but not to be written out. 



374 



END BLOCK 



Size 

1 byte 



Contents 

block type identifier. 



TIME BLOCK 



373 



iast 
access 



day 
created 



time 
created 



(follows name block except on links) 



Size 

1 byte 

2 bytes 

2 bytes 
2 byies 



Contents 

block type identifier. 

Julian day last accessed (opened) since Jan. 1, 

1968 (day 1). 

Julian day created. 

.left byte contains hour, right byte contains 
minute created. 

no terminator 



C-2 



093-000109-01 



Licensed Material - Property of Data General Corporation 



I^taGoieral 

SOFTWARE DOCUMENTATION 



•\l 


LINK DATA BLOCK 

(If the file is a link entry, this follows the name block.) 

Size Contents 


372 


1 byie block type identifier. 


1 dirname it. variable alternate directory name (if any). 


null 


variable resolution filename terminated by null. 


: resfiiename ^ ^2 nulls if link has neither aliernaie directory 


null 


NOTE: These 2 names are written via system calf .WRL, so 
if reading from paper tape, use .RDL to avoid parky 
problems. 





371 



attributes 



LINK ACCESS ATTRIBUTES BLOCK 

Size Contents 

1 byle block type identifier 

2 bytes link access attributes 



370 



number 



data 



null 



END OF SEGMENT BLOCK (PAPER TAPE) 



Size 


Contents 


1 byte 


block type identifier. 


2 bytes 


-1. 


1 byte 


segment number. 


variable 


filename. 



End of Appendix 



093-000109-01 



C-3 



Dump File Format 



Licensed Material - Property of Data General Corporation 



DataGeneral 

SOFTWARE DOCUMENTATION 



Appendix D 
Extended Uses of the CLI 



This appendix describes the CLFs mechanism for 
handling keyboard commands and explains how you 

can use it to evoke the CLI from a currently-executing 
program. 

Although the CLFs primary function is to serve as an 
interl'ace to the operating system and your computer, 
you can also use it to execute commands from within 
an assembly-language program, and to pass arguments 
to your program. 

Before you can do either of these things, you must 
understand the special files which the CLI uses to 
communicate with user and utility programs. One file, 
called CLI. CM, exists specifically to hold- certain 
unedited commands for the CLI. the CLI stores the 
RLDR command line for SYSGEN in CLI.CM. A 
second file, COM.CM, is built by the CLI to hold your 
edited command line and switches. If the command 
line invokes a utility program, the utility examines 
COM.CM; if the command line invokes a user 
program, the program itself can examine COM.CM. 
Passing instructions to a program via COM.CM is 
described in the second section of this appendix. 

If you are running a CLI in the foreground of a mapped 
system, the foreground CLI filenames (and all other 
special CLI files) begin with an F. COM.CM, for 
example, is FCOM.CM for the foreground CLI. In all 

other respects, the files are identical to those in the 
background. 

Swapping and Chaining to the CLI 

You can swap or chain to the CLI (filename CLI.SV) 
via the system call .EXEC. If you .EXEC the CLI with 
AC2 not equal to 0, the CLI will search for the special 
file CLI.CM, interpret the command string that it reads 
from CLI.CM, and execute these commands exactly as 
if they had been input from the console. These 
commands won't be noted in the log file. When the 



CLI has executed all commands, it will display its R 
prompt. You can then return to your program by 
entering the POP command from the console. 

If you choose to return to the next higher-level 
program without console intervention, you can insert 
POP into CLI.CM as the last command to be executed. 

Note that when you .EXEC the CLI in this way, and it 
detects an irrecoverable error in CLI.CM (like an error 
inside @ signs), it takes the error return from .EXEC 
to the program with error code 16g (ERFUE = 
"FATAL UTILITY ERROR") in AC2. Depending on 
your needs, you might want to have the program check 
for error ERFUE and take appropriate action. (The CLI 
will not take the error return from background level 0; 
instead it will go to the console for input.) 

Returning with Error Status to the CLI 

When a program executed from the CLI returns to the 
CLI via the system call .ERTN (return from a swap 
with error status), the CLI examines the contents of 
AC2. If AC2 contains mnemonic EREXQ (code 17g ), 
the CLI will search for CLI.CM and execute its 
contents as described above. If AC2 contains any other 
error code, the CLI will interpret the error and display it 
on the console (unless AC2 contains error code 
ERNUL, 20g , in which case the CLI displays nothing). 



FILE DOES NOT EXIST: MYPROG.SV 

would indicate that error ERDLE had occurred 
somehow in program MYPROG.SV and that yVPROG 
had taken the error return and reported the error to the 
CLI via the .ERTN system call. 

The following figure shows the assembled listing of a 
.program which stores commands in CLI.CM, invokes 
the CLI on level two, and then POPs itself back into 
execution. 



093-000109-01 



D-1 



Swapping and Chaining to the CLI 



SOFTWARE DOCUMENTATION 



Licensed Material - Property of Data General Corporation 



000001 

00001 '006^17 
i00a2'ilia003 
00a03'000a22 

0000a»020a3l 
003id5'02«aa2 

00006'006017 
00Ma7'0l&a03 



START 



.TITL XCLI 




,NREL 




,TXTH I 




LDA 0, CFILE 


# Pointer to CLI.CM. 


.SYSTM 


; S y » t e m , 


.OPEN 3 


ropen CLI.C.M on channel 3, 


JMP EH 


;Mand«topy epfof return 




i 1 ocat 1 on. 


LDA 0, CMANOS 


iPointer to CLI commands. 


LDA I, BCOUNT 


^Bytecount of commands, 




Mn CUM,C?^# for ,WKS. 


.SYSTM 


; System, 


.rtRS 3 


rWrite commands to CLI.CM 



00010' 
000U • 
§0012' 
00013' 
000ia« 

00015' 
00016' 
00017' 
00020' 



000415 
006017 
0iaa03 
000ai2 
020«3«4 
126a00 
152520 
006017 

003400 



00021 •000a0« 
00022*006017 

00023'00«a0id 
0002a'000a0i 



JMp Ek 

.SYSTM 

.CLOSE 3 

JMP ER 

LDA 0, CLISV 

SUB 1, 1 

SUbZL 2, 2 

.SYSTM 

• EXEC 

JMP ER 
.SYSTM 
.RTM 
JMP ,tl 



fOn Channel 3, ,WRS permits 
Jmultfllne commands, 
iRequlred location. 

iClose channel to update file, 

;Requi red. 

;Pointer to CLI.SV. 

;Clear ACl for swap, 

;Pa8S nonzero value <n AC2. 

;Sw3p in the CLI on level 2, - 

;CLI.CM's POP command will bring 

Jthis program bacic on level 1. 

; Mandatory, 

;DK- Return to 

; level CLI. 

;Reservedr never taken. 



rTake error return, let the CLI report error status: 



00025'006017 ER: 

00026'006a00 

00027'000a0l 

;Other labels: 

00030'000062"CFILE: 
00051 '0ai5ia 

0aaa56 

0111515 

000000 



.SYSTM 
.ERTN 
JNP , 



. + 1*2 

.TXT "CLI.CM" 



lError return is never taken^ 



JCommand file CLI.CM, 



00035'00007^"CMANOS: .+1*2 
00036'0a2111 .TXT ' 

051513 
03551« 
0a«52i 
052057 

0^7073 
050117 
050015 

000000 
00047'000i2« BCOUNT: ( BCOUNT-CMANOS) *2 



DISK;lIST/N,-P0P<15>" ,*Commands for CLI.CM. 



00050'000122"CLISV: 
00051 'duism 

04a«56 

051526 

000000 



. + 1*2 

•TXT "CLI.SV" 



INumber of bytes 
rto CLI.CM, 



to wpI te 



#CLI name, for swap. 



,tH-0 START 
■ figure D-L Program Which Uses CLI.CM ■ 



D-2 



093-000109-01 



Licensed Material - Property of Data General Corporation 



EfetaGeioBl 

SOFTWARE DOCUMENTATION 



CLI Reserved Files 

In addition to (F)CLI.CM and (F)COM.CM, the CLI 

uses the following files to perform. You may never 
want to use these files, but be aware of their names and 
don't try to create files with identical names. 

CLI.SV, CLI.OL, CLI.ER. The CLI save, overlay, and 
error interpretation files. You can e.xamine the CLI.ER 
(including ASCII error messages) with the FPRINT/Z 
command. 

(F)CLI.Tn (F)CLI.Cn (F)CLLSn These are the CLI 
virtual buffer files, n corresponds to the system level 
on which the CLI is operating; it can be 0, 1 , 2, 3, or 4. 

(F)TML.TM. CLI creates this file for the alphabetical 
son required by a LIST/S command. It is deleted after 
the sort. 

Using the CLf's Command File 
(COM.CM) 

When the CLI reads a command line, and does not 
recognize the first word as a simple command, it 
assumes that the command involves a user program or 
utility program. It then builds file COM.CM 
(FCOM.CM if it is operating in the foreground; 
mapped RDOS only) to contain the edited command 
line, including filenames, switches, and other 
arguments. It then brings in the utility program, which 
always examines COM.CM, or a user program, which 
may examine COM.CM. The COM.CM built for each 
utility program has a specific format, which the utility 
expects; the COM.CM built for a user program also has 
a specific format, which you can use to pass instructions 
or arguments to your program. 

For example, assume that you issue the command line: 

FOO) 

The CLI does not recognize FOO as a known command 
word. It therefore builds a command file with the 

word/byte organization shown in Figure D-2. 



word 


1 

2 
3 
4 

Figure D-2. C 


ijvte/conlents bvte/conlents 




F 










null 











' 


3778 




^OM. CM File for Command FOO } 



Each character of the filename occupies a byte. The 
filename is terminated by a null byte. 2 words (4 bytes) 
are reserved for global switches of FOO. Each letter 
switch sets a bit. /A sets bit of the first word, etc., as 
shown in the switch/bit correspondence diagram in 
Figure D-3. The CLI uses 377g for the terminal byte. 

Bit 15 of the second word in the global switches field is 
always set for files running under BATCH (RDOS 
only). This informs RDOS that it is running BATCH 
insteadof the CLI. 

When a square bracket is detected in an RLDR 
command line, it is passed as a filename with bit 10 in 
the second word of the switch information set (this bit 
follows the Z switch position). A comma within a 
square bracket is treated the same way (bit 10 set). 

For any non-CLI command you type, the COM.CM is 

arranged the same way. Each filename argument gets a 
byte for each character and is terminated by a null byte; 
four bytes are reserved for the switches of each 
filename. The CLI does not interpret switches when it 
builds the command file; it simply sets the appropriate 
bit. Assume that you type the command: 

FOO/B A ZZZ/X MUMBL) 

The CLI would then build the COM.CM file shown in 
Figure D-4. (You can examine COM.CM after any 
command with command FPRINT/Z/B COM.CM. ) 



Word 12 in figure 0-2} 
Word 1 13 in figure 0-21 



' 


1 


2 


3 


4 


5 


6 


7 


8 


9 


10 


11 


\ 

12 


,3 


14 


15 


A 


B 


C 


D 


E 


F 


G 


H 


1 


J 


K 


L 


M 


N 





P 


Q 


R 


S 


T 


U 


V 


™ 


X 


Y 


Z 















Figure D-3. Bits Set for Switches by the CLI 



4 ^ 



093-000109-01 



D-3 



Using the CLI's Command File 
(COM.CM) 



EfetaGonaBl 

SOFTWARE DOCUMENTATION 



Word 

1 
2 
3 
4 
5 
6 
7 
8 
9 
10 
1 1 
12 
13 
14 
15 
16 



Licensed Material - Property of Data General Corporation 



Left byte/ 

contents 


Right byte/ 
contents 


F 


O 





null 


1B1 











A 


null 














2 


2 


Z 


null 








1B7 





M 


u 


M 


B 


L 


null 














377» 





■| Command file name FOO. 
I terminated by null byte. 

I Global switch field of FOO 
I Bit 1 (B switch) on. 

I Argument A, terminated by null byte. 

\ 2 words 14 bytes) reserved for 
J local switches of A. Norte set. 
\ Argument Z22, 
I terminated by null byte. 

1 Local switcties of 222. 

I Bit 7 of word 2 (switch X) on. 

I Argun^enf MUMBL. 
(' terminated by null byte. 

I, Local switches of MUMBL. 
( None set. 



■ Figure D-4. COM.CM File for Command FOO/B zzz/x MUMBL)- 



Since the CLI does not interpret switches, you can 
write programs which interpret switches, and act on 
what they read. 

A read line (.RDL) from a disk file always terminates 
on a null (or on a carriage return and form feed). This 



null can help you to read COM.CM and FCOM.CM 
arguments. Figure D-5 illustrates how a background 
program could read the first argument of the command 
file as well as its global switches. (We have removed the 
location data from the assembler listing.) 



ididemi 


.TXTM 


I 


020a20 RESO: 
006017 

Bt5e«i2 
020^21 


LDA is, COWCM 

.SYST^. 

.OPEN 5 

JNiP ER 

Ll/A li, fikGI 


0W&017 
«S15u05 


.SYST*' 
.KOL 5 




02id«J0 


J^<P Eh 

IDA B, 


cs^ncH 


0«Jb0l7 

01S01S5 


LDA I, 

• SYSTPr 
.RbS 5 


c« 


B^0«BS 


JMP £R 





J F • t « I e 



POP 



iSdbvn ER{ .SYSTM 

J Other leDelt: 



e«i5«}«42"COMCM: 

tS«JB1^2"6S«ITCH: 
^*?aai2 



♦ 1«2 

TXT "lO^'.Ci'' 



♦ l»2 
bLK IB. 
.t|«2 

• BLU 2 



JFo<nter to COM.CM 

iSyitem, 

IDpen COf'.C^^ or\ channel 5. 

;Nequ<red error location, 

."Poiftter to first argumer^t {fchith 

Mi the fflenane of thit prograi?.). 

;Syite», 

»reaa the first argument in 

;CO>'.CK. The null ter«inater 

; al io t r»n» f erreo. 

j^'-ancatory . 

;Pointer to globa! iKitcnet for 

» f i ra t arguinerit . 

;NuB--Def of tjytea to r*«a, 

; S y • t e i-. , 

J reao tne u bytes iihich specify 

; swi tches, 

/•This coot oerives tne switches fron- 
.'values In t."^e u oytes, ana directs 
;progra«- control accorainp to «.hat it 
;ffnoi. Haraifeter file P&Pu.SR 
Joefines i»itcr. oil settines. The 
;frosr#». can tner^ preceeo to Cf^eck 
;the iecona argument, ar^o its 
.'local ••ftcnes, if it «.anti. 



« by le po» nt er 
;tc CO^.CN. 



JPeinter to space for 
.•first trgumtnt Caec«»»1), 
.Pointer tc space for 
;9lota1 twitches. 



Figure D-5. Reading File COM. CAf 



D-4 



093-000109-01 



Licensed Material - Property of Data General Corporation 



SOFTWARE DOCUMENTATION 



Utility Program COM. CM Structures 

Following is a series of illusirations depicting the 
command file structures for all system utilities available 
via the CLI. The CLI always builds COM. CM this way, 
regardless of the order you specified in the utility 

command line. 



LFE 



dtrot iiitinq 'ilename 



otiSOutmastef loyioalt 
■ocai swiicn 



islmg filename loasoytl 



local swijcn 



•ocat swHicf 



'ocai s*itcn 



— : 



ALGOL 



g'-oeai iw>(cr^es 






'ocii so.icr 






iss«mci» ssufce uts "ouiouii 




lOCil %mncn ; 


comm^et source ttm tmouii 
;ocai swiicn 






MAC 



gioDai swiienes 


error hiename 


:ocai swiicn 


i 


Omaiv l.iename loytourl i 


socai swiicn 


1 


iistir^q lilersame tOutDuIl 1 


local swiicrs j 


soyrce iiiename, imoyif i 


local swiicnes 


1 


• j 


source iiiename^ iinousi ( 


local swiicnes 


1 



ASM 



giCDat swi!c-es 


error i.Sename 


socai sullen 


Omarv filename 'OuSOuSI 


local switcPi 




iissmg l.iename •ousoutl 


local swiicn 


soyfce iiierame, unoyil 


local swilcr^es 


• 


source iiiename», ..nousi 


local switches 





OVLDR 



BATCH 



gioDai swiicnes 



QufDui file 
local switch 



local switch 



lOOtilen 



giooai swiicnes 



error dlename 



local swiicnes 



Binary liiename touSDufl 
local switches 



- 



listing l.ier>am« 



local swiicnes 



overlay reoiacemeni tilename (,ORJ 



local swiicnes 



overlay descrioior 
local switches 



new overlay name 



local switches 



overlay oescriDtor 
local swiicnes 



. This recurs lor 
I every new overlay 
I name lollowing this 
' overlay descnotor 



new overlay name 



local switches 



; This recurs lor 

ij every new overlay 
i J name following this 



overlay descriDior 



RLDR 



FORT 


giooai swiicnes 


or 
FORTRAN 


error tslename 


local switch 




binary filename 




local switch 




lisimg filename loulpull 

local switch 1 




assembly soyrce lite lootoutl 
local switch 




comoitef source file (rrspytl 




local swiicri | 



or 2 local switch < 
intormalion 




Var laoie order 



093-000109-01 



D-5 



Utility Program COM. CM Structures 



DataGeneral 

SOFTWARE DOCUMENTATION 

Given the overlay definition [A. B. CJ. the overlay 

definition field would look like: 



0»«t«f tSefmiSKjn 





s 














! null 


i Bfscnei 










•1 








IB to 


j' i-ocai »«itcn tima 






* 


! null 


. 0»#f lay A »,i#name 










'i , 










-— — • Lo<.ai switcn (.era 








! nu,t 


Comma 




« 








I ! 8 ! 


"~ J to<«ii iw.tcn tieio 






3 


i r:uil 


.0»#«i»v3'.!#name 










J 




-|- LOcais«..tcf!i.eia 








Itlil 


: Comma 










J , 








■B-O 


'l Local sw. ten field 



Licensed Material - Property of Data General Corporation 

Source filenames are listed in the order that they appear 
in the command line; source filenames receive the 
extension .FR by default. The following local switch 
operations occur in CLG: 



/A 



/C 



/K 



/O 



Source file argument is given the extension 
.SR. 

Channel argument is convened to octal (RLDR 

phase). 

Task argument is converted to octal (RLDR 
phase). 

Source file argument is given the extension 
.RB. 



Local switch information fields (C, F, K, N, or Z) and 
overlay definition fields may occur in any order 
following the fixed portion of the command file' 



CLG 



giooai s*iic!^es 



error filename 
iocai switches 



;»slmq fj!€narne 
iocai swiicfies 



save iilename 
local swiicnes 



_J 



source liienaraes 
:ocai s*'fcies 



See HLCR Socai sw.tcn and 
Overlay Oelm.iion mforrtialion 



End of Appendix 



D-6 



093-000109-01 



Licensed Material - Property of Data General Corporation 



EfetaGeieral 

SOFTWARE DOCUMENTATION 



Index 



Within this index, the letter "f means "and the 
following page"; the letters "fT' mean "and the 
following pages". All entries are lowercase, except CLI 
commands (e.g., APPEND), filenames (e.g., 
FLOG.CM), and acronyms (e.g., CLI). Italic entries 
indicate primary page references. 

absolute binary 4-5 If 

access to files 4-15f 

advanced features Chapter 3 

ALGOL 4-6f 

angle brackets 3-3f 

APPEND 4-7 

ASM 2-7, 4-8f 

assembler see ASM, MAC 

attributes file 4-15, also see LIST 

ASCII characters B-1 

asterisk convention see templates 

background 3-6ff, also see EXFG, SMEM 

BASIC 4-9 

BATCH 4-10 

binary, absolute 4-5 If 

BOOT 4-1 Of 

BPUNCH 4-12 

breakfile 4-64 

BSYSGEN see SYSGEN 

BUILD 3-5, 4-12ff 

cassette see tape 
CCONT 4-13 
CDIR 4-14 
CHAIN 4-14 
characteristics, file 4-15 
CHATR 2-n, 4-15 
CHLAT 4-16 
CLEAR 4-17 
CLG 4-18 
CLI 

advanced features Chapter 3 

error messages Appendix A 

extended uses of Appendix D 



operating Chapter 2 

overview Chapter 1 

reserved files D-1, D-3 

system interface 3-6 
CLI.CM 4-69, D-1 
COM.CM 

function 3-6, D-1 

reading D-4 

switch/bit settings D-3 

utility program D-5f 
comma 

in angle brackets 3-3 

in CLI line 2-1 

in overlay definition 4-61 

in parentheses 3-2 
command line 

expansion 3-2ff 

formal 2- If 

punctuation summary 2-3 
commands 

alphabetically 4-6 to 4-75 

categorically 4-2ff 

combining 1-2 

extending line 1-2 

indirect 3-4ff 

macro 3-4ff 

punctuation summary 2-3 
compact command lines 3-2ff 
compiler see ALGOL, CLG, FORT, FORTRAN 
console 1-lf 

breaks 2-12 

control characters 1-lf, also see CTRL 
control characters 1-lf 
COPY 4-19 
CPART 4-20 
GRAND 4-20 
crash 2-14, also see CLEAR 
CREATE 4-21 
CTRL 

A 1-1,2-12,3-8 

C 2-12,3-% 

F 2-12, i-#/ 



093-000109-01 



lndex-1 



I^taGeneral 

SOFTWARE DOCUMENTATION 

Q 1-2 
S 1-2 

Z 3-5f 



dash convention see templates 
DEB 4-21 

debugger 4-21,4-62 
DELETE 4-22 
device 

names(DOS) 2-5 
names(RDOS) 2-4 
DIR 4-23 
directories 
access to 2-9f 
definition of 
DOS 2-8 
RDOS 2-7f 

initializing and releasing 2-9f 
master 2-9 
names 2-9 
directory (DOS) 2-8, also see CDIR 
directory specifier 2-9f, 4-1 
DISK 4-23 
disk 

directories see directories 
filenames 2-6f 
names 2-4 
diskette, copying 4-19 
copying 4-9 
directories 2-8ff 
filenames 2-6f 
names 2-5 
documentation conventions iv 
dual programming 3-6f, also see foreground 
DUMP 4-24f 
dump file block format C-lff 

EDIT 4-25 
ENDLOG 4-26 
ENPAT 4-26f 
EQUIV 4-28 
EREXQ D-1 
ERNUL D-1 
error 

handling 2-12f 

messages Appendix A 

system 2-14, Appendix A 
.ERTN 2-12f, D-lf 
EXFG 3-7f 

extended uses of CLI Appendix D 
extensions to filenames 2-6f 

FCOM.CM D-1 
FDUMP 4-30 
FOND 4-31 
FILCOM 4-32 
file 

access to see CHATR 



Licensed Material - Property of Data General Corporation 

attributes see CHATR, LIST 

break 4-64 

characteristics 4-15,4-42 

dump C-lff 

extensions 2-6f 

listing 2-6 

media 2-4 

name see filename 

statistics see LIST 

system directory (SYS.DR) see INIT 

use count 4-17 
file name 

device 2-4f 

disk(ette) 2-6ff, 4-60 

extensions 2-1 Of, 4-60 

templates 2-1 Of 
filename command 4-6 
files 

comparing 4-32 

copying see MOVE 
FLOAD 4-32f 
FLOG.CM D-1 
foreground 3-6ff, also see EXFG, SMEM 

terminating 3-8f 
FORT 4-33f 
FORTRAN 4-34f 
FPRINT 4-35 

GDIR 4-36 
GMEM 4-36 
GSYS 4-37 
GTOD 4-37 

IDEB 4-62 

indirect commands 3-4ff 

INIT 4-38 

interrupt, console see console break 

inierrupt-disable debugger 4-62 

ISYSGEN seeSYSGEN 



LDIR 4-39 
LFE 2-7, 4-39f 
library files 2-7, 4-39f 

library, system (SYS.LB) see RLDR 
line printer formal control see VFU 
LINK 4-4 If 
link entry 

attributes 4-16 

creating 4-41f 

definition of 2-ll,4-41f 

removing 4-72 
LIST 4-42f 
listing file 2-6 
LOAD 4-44 

loader see RLDR. OVLDR 
LOG 4-45 



lndex-2 



093-000109-01 



Licensed Material - Property of Data General Corporation 



DataGeneral 

SOFTWARE OOCUMENTATSOm 



magnetic tape see tape 
manuals 

organization of this manual iii 

related iiif 
mapped system 3-6rf. also see EXFG 
master directory 2-9,4-49,4-59 
MAC 2-7, 4-46f 
MCABOOT 4-47f 
MDIR 4-49 
MEDIT 4-49 
MESSAGE 3-3, 4-50 
mistakes 1-lf, 2-12f, also see errors 
MKABS 4-51 
MKSAVE 4-52 
MOVE 4-52f 

NSPEED 4-53 
NSYSGEN seeSYSGEN 

OEDIT 4-54 

organization of manual iii 
overlays see RLDR or OVLDR 

OVLDR 4-54f 

parentheses 3-2fr 

partition 2-7f, also see CPART 

PATCH 4-55, also see ENPAT 

POP 4-56, D-\ 

PRINT 4-57 

PUNCH 4-57 

RDOSSORT 4-58f 
RELEASE 4-59 
RENAME 4-60 
REPLACE 4-60 

reserved files D-1, D-3 
resolution file 2-12, 4-4 If 
RESTART.SV 4-11 
REV 4-61 
RLDR 2-7, 4-61ff 

SAVE 4-64 
SDAY 4-64 
SEDIT 4-65 
SMEM 4-65 
sort see RDOSSORT 
SPDIS 4-66 
SPEBL 4-66 



SPEED 4-67 

SPKILL 4-67 

spooling 4-66f 

stand-alone programs 4-1 Of, 4-62 

STOD 4-68 

subdirectory 2-7f, also see CDIR 

swap see CHAIN, POP, D-lf 

switch definition of 

global 2-1 

local 2- If 

setting in COM. CM D-3 
symbols 

CLI 2-3,3-1 
SYS.DR see CLEAR, INIT 
SYSGEN 4-68f 
SYS. LB see system library 



tape 

device names 2-4f 

usage 2-5 
text 

editors see EDIT, MEDIT, NSPEED or SPEED 

in commands 4-50 
TPRINT 4-70 
trap 2-14 
tuning 4-70f 
TUOFF 4-70 
TUON 4-71 
TYPE 4-71 



UNLINK 4-72 

unmapped 3-6f, also see EXFG 

use count 4-17 

utility program 

COM.CM structure D-5f 
operation summary 2-7 
summary l-2f 



variables 3-4 
VFU 4-72ff 



XFER 3-5f, 4-75 



093-000109-01 



lndex-3